sftp / gost34.11-2012_stribog
GOST-34.11-2012 (Stribog) hash-function
☆11Updated 9 years ago
Alternatives and similar repositories for gost34.11-2012_stribog:
Users that are interested in gost34.11-2012_stribog are comparing it to the libraries listed below
- A cryptographic library☆80Updated 2 weeks ago
- GOST R 34.12-2015 encryption algorithms implemented as loadable modules for Linux kernel☆12Updated last year
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆11Updated 3 months ago
- Java and MS CryptoIAPI for CXF WS-Security signature☆21Updated 11 years ago
- The SPARX family of lightweight block ciphers☆10Updated 6 years ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆12Updated 4 years ago
- ☆11Updated 9 years ago
- x100 faster implementation of GOST 34.12-2015 Kuznyechik optimized for high throughput and low latency on SSE2-capable CPUs☆20Updated 5 years ago
- Implementation of the proposed Russian block cipher standard, Kuznechik ("Grasshopper"). 128-bit block size, 256-bit key.☆60Updated 10 years ago
- Implementation of Strumok stream cipher☆16Updated 2 years ago
- Reference implementation of the Kalyna block cipher (DSTU 7624:2014), all block and key length variants☆34Updated 4 years ago
- ☆12Updated 4 years ago
- Implementation of Kuznechik cipher Russian standard GOST R 3412-2015 - 128 bit block size / 256 bit key - 8,16, 32, 64, 128-bit x86 versi…☆8Updated 8 years ago
- TLS client/server framework mimics OpenSSL to SSP interface☆28Updated 2 months ago
- Cryptography standards of the CIS countries☆70Updated 4 years ago
- ☆44Updated 5 years ago
- ☆13Updated 3 years ago
- masked, bit-sliced AES-128 demo code☆13Updated 2 months ago
- Cryptography Standards of Belarus☆18Updated this week
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆35Updated 2 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Updated 5 years ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆13Updated 7 years ago
- Графическая утилита для работы с Рутокенами в Linux и macOS☆16Updated 2 years ago
- Add support for reading and writing of trace set files (.trs) to Python☆23Updated last week
- Multiplex several Cryptoki Libraries (PKCS #11 programming interface of various cryptographic tokens)☆18Updated 6 years ago
- A polymorphic interface for elliptic curve operations☆41Updated last year
- NIST Lightweight Cryptography Primitives☆55Updated 2 years ago
- Cryptographic library for EAC version 2☆72Updated this week
- A Common Criteria (CC) and FIDO certified FIDO U2F javacard applet.☆33Updated 2 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 3 years ago