sneves / blake2-avx2View external linksLinks
BLAKE2 AVX2 implementations
☆24Dec 22, 2019Updated 6 years ago
Alternatives and similar repositories for blake2-avx2
Users that are interested in blake2-avx2 are comparing it to the libraries listed below
Sorting:
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- Implementations of do255e and do255s in C and assembly☆25May 3, 2021Updated 4 years ago
- ☆14Apr 14, 2025Updated 9 months ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆14Mar 25, 2025Updated 10 months ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- We implement Delegatable Anonymous Credentials using Mercurial Signatures☆21Jun 7, 2022Updated 3 years ago
- Java libsodium bindings☆12Sep 3, 2017Updated 8 years ago
- AVX2 Chacha implementation☆16Nov 23, 2013Updated 12 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Jul 29, 2017Updated 8 years ago
- ☆12May 7, 2021Updated 4 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Oct 4, 2022Updated 3 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Fast block cipher implementations (x86-64) in counter-mode for the SUPERCOP cryptographic benchmarking framework. Artifacts of implementa…☆11Nov 12, 2018Updated 7 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- ☆15Apr 16, 2022Updated 3 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 2 years ago
- Guidelines, procedures, and templates used by the IETF Moderators team.☆23Jan 29, 2026Updated 2 weeks ago
- Banquet implementation☆14May 6, 2022Updated 3 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆29Jan 17, 2018Updated 8 years ago
- Official SQISignHD code, version under continuous development.☆12Jul 18, 2025Updated 6 months ago
- AES-GCM-SIV implementations (128 and 256 bit)☆118Jul 1, 2019Updated 6 years ago
- SipHash AVX2 implementation in C☆15Mar 3, 2016Updated 9 years ago
- Elliptic curves Rust reference implementation☆16Mar 10, 2024Updated last year
- C library providing BLAKE2b, BLAKE2s, BLAKE2bp, BLAKE2sp☆139May 14, 2023Updated 2 years ago
- An ENGINE gluing together OpenSSL and NaCl-derived crypto.☆18Apr 14, 2023Updated 2 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆17Oct 11, 2016Updated 9 years ago
- This is a toy implementation of the dudect ideas in Go. All credit goes to Oscar Reparaz, Josep Balasch and Ingrid Verbauwhede for dudect…☆19Jul 12, 2017Updated 8 years ago
- Proof of Device☆21Jan 20, 2023Updated 3 years ago
- An implementation of Mike Hamburg's Ed448 (Goldilocks) curve - derived from libdecaf. This is a mirror of https://bugs.otr.im/otrv4/libgo…☆19Mar 16, 2020Updated 5 years ago
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆20Jan 1, 2026Updated last month
- This is only the beginning.☆19Feb 4, 2026Updated last week
- Optimized implementations of Poly1305, a fast message-authentication-code☆47Feb 6, 2015Updated 11 years ago
- Optimized, portable implementations of BLAKE2b☆25Feb 5, 2016Updated 10 years ago
- Flexible, stand-alone benchmarking☆18Apr 4, 2018Updated 7 years ago
- ☆15Apr 25, 2018Updated 7 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- BAT KEM/Signature Reference Implementation☆23Dec 28, 2021Updated 4 years ago
- BLST-Verification☆23Jan 22, 2026Updated 3 weeks ago