A permissively licensed, low-level, high-performance cryptographic hash library for hackers.
☆27Jun 6, 2025Updated 11 months ago
Alternatives and similar repositories for llhash
Users that are interested in llhash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- go implementation of anchorhash☆15Nov 19, 2020Updated 5 years ago
- An EXPERIMENTAL Go implementation of the CPace PAKE, instantiated with the ristretto255 group.☆29Feb 11, 2021Updated 5 years ago
- fft impl for ff::Field☆17May 9, 2024Updated 2 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆33Jun 6, 2022Updated 3 years ago
- Intel assembly finite field library generator☆13Nov 23, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A fast and unsafe version of an optimized C library for EC operations on curve secp256k1☆25Sep 18, 2023Updated 2 years ago
- elliptic curve construction tool☆17Feb 24, 2023Updated 3 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- NIST P-256 signatures for Cortex-M4 microcontrollers☆16Mar 14, 2021Updated 5 years ago
- Parallel programming library in C++11☆13Jan 2, 2020Updated 6 years ago
- A constant-time library for big integers modulo a prime, usable for cryptographic applications. Exported from crypto/internal/bigmod, the…☆15Jan 3, 2026Updated 4 months ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated last year
- Tools for computing Elliptic Curve interval discrete logarithms using Pollard's lambda algorithm☆25Jul 29, 2020Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- WIP: code generation package in Go -- used by gnark, goff and gurvy☆14May 13, 2026Updated last week
- An authenticated data structure based on a red-black tree.☆54Jul 27, 2015Updated 10 years ago
- Rust binding for fastpbkdf2☆15Jun 29, 2025Updated 10 months ago
- Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registri…☆66May 10, 2026Updated last week
- MD4 Collisions MD4 is a 128-bit cryptographic hash function, meaning it should take a work factor of roughly 2^64 to find collisions. It…☆17Dec 19, 2017Updated 8 years ago
- A Python implementation of HMAC_DRBG (see, NiST SP 800-90A).☆14Nov 18, 2015Updated 10 years ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 6 years ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆16Jan 31, 2026Updated 3 months ago
- [RFC9380] Hash to curves - Rust reference implementation☆27Mar 10, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Feb 3, 2018Updated 8 years ago
- ☆15Nov 2, 2022Updated 3 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 5 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- A Reth Execution Extension (ExEx) with shared object (.so / .dylib) plugins☆16Oct 12, 2024Updated last year
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- Implements the Barreto-Naehrig (BN) curve as used by Ethereum☆12May 31, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- ☆10Aug 8, 2022Updated 3 years ago
- ☆12May 7, 2021Updated 5 years ago
- Summaries of findings from Ampleforth audits☆12Jun 2, 2025Updated 11 months ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago