sneves / chacha-avx2
AVX2 Chacha implementation
☆16Updated 11 years ago
Alternatives and similar repositories for chacha-avx2:
Users that are interested in chacha-avx2 are comparing it to the libraries listed below
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 6 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- Generator of "nothing-up-my-sleeve" constants☆23Updated 9 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆22Updated 8 years ago
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆36Updated 7 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- Several example uses of TPM2/TSS APIs.☆10Updated 9 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 7 years ago
- A highly portable, self-contained version of ROUND5 post-quantum algorithms for embedded platforms.☆17Updated 5 years ago
- ☆17Updated 10 years ago
- Fuzzing compression libraries☆19Updated 9 years ago
- CRYPTOGAMS distribution repository☆56Updated 5 months ago
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- An effective attack against the Argon2i hash function☆9Updated 7 years ago
- Fun with the TLS handshake☆31Updated 10 years ago
- Plug-and-play IP rate limiter in C☆24Updated 4 years ago
- Wisecracker is a high performance distributed cryptanalysis framework.☆49Updated 8 years ago
- Dynamic instrumentation of the Linux kernel☆41Updated 10 years ago
- A deceptively simple way to add a configuration file to a command-line application.☆16Updated last month
- An implementation of the OPAQUE password-authenticated key exchange protocol☆10Updated 5 months ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- A fast secure userspace pseudorandom number generator☆82Updated 10 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Updated 9 years ago
- Undefined Behaviour Snippets☆17Updated 8 years ago