sphincs / low-ram-sphincsplusLinks
Sphincs+ implementation which uses minimal RAM
☆13Updated 2 years ago
Alternatives and similar repositories for low-ram-sphincsplus
Users that are interested in low-ram-sphincsplus are comparing it to the libraries listed below
Sorting:
- An AES-based 384 bit permutation.☆21Updated 8 months ago
- Haraka is a secure and efficient short-input hash function.☆59Updated 8 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Updated 2 years ago
- C implementation of the BlaBla20 cipher☆10Updated last week
- A tiny, portable implementation of the IPCrypt specification in C.☆32Updated this week
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆35Updated 2 weeks ago
- An implementation of the ROCCA-S encryption scheme.☆20Updated 5 months ago
- SLotH -- An SLH-DSA/SPHINCS+ Hash-Based Signature Accelerator☆39Updated 9 months ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated 2 months ago
- A fast AES-PRF based secure random-number generator☆21Updated 2 years ago
- ☆38Updated 4 years ago
- Repository for the current status of the LESS submission☆13Updated last week
- ☆25Updated 7 months ago
- A simpler alternative to the Noise protocol framework.☆22Updated 5 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆29Updated 7 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 6 months ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- A collection of high-performance crypto implementations.☆52Updated last month
- Optimized Binary GCD for Modular Inversion☆49Updated 5 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 4 years ago
- C crypto library☆24Updated 2 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Updated 2 years ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated this week
- BAT KEM/Signature Reference Implementation☆23Updated 4 years ago
- AEGIS-256☆11Updated 3 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Updated 2 years ago
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Updated 8 years ago
- Rainbow signature system for Round THREE submission☆20Updated 5 years ago
- Specification for the AEGIS family of authenticated encryption algorithms.☆20Updated 2 weeks ago