AES Galois Extended Mode
☆25Feb 9, 2026Updated 3 months ago
Alternatives and similar repositories for aes-gem
Users that are interested in aes-gem are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AES-GEM (AES Galois Extended Mode) implementation.☆14Feb 9, 2026Updated 3 months ago
- Experimental committing AEAD designed by Soatok.☆11Sep 10, 2020Updated 5 years ago
- Official specification and reference code for Fast Lightweight Online Encryption (FLOE)☆45Apr 8, 2026Updated last month
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆17Oct 11, 2016Updated 9 years ago
- Open Cryptanalysis Platform☆15Apr 2, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆38Mar 31, 2026Updated last month
- Masked implementations of PQ schemes for the Cortex-M4.☆14Mar 11, 2026Updated 2 months ago
- ☆11Oct 4, 2023Updated 2 years ago
- A backup decryptor and OTP generator for the vault of the Aegis Authenticator Android app.☆24Mar 4, 2026Updated 2 months ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆12Feb 28, 2020Updated 6 years ago
- Finalists to the NIST lightweight cryptography competition☆41Jun 29, 2022Updated 3 years ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆38Dec 18, 2024Updated last year
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆19Nov 2, 2023Updated 2 years ago
- QARMA block cipher in C☆32Sep 10, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 5 years ago
- raw bindings for git://git.kernel.dk/liburing☆17Jan 15, 2020Updated 6 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Secure Computation Utilities☆17Mar 5, 2026Updated 2 months ago
- Unofficial gnuk mirror of http://www.fsij.org/category/gnuk.html☆11Aug 20, 2018Updated 7 years ago
- Repository containing code accompanying the paper "Aggregating Falcon Signatures With LaBRADOR".☆17May 26, 2024Updated last year
- Haraka is a secure and efficient short-input hash function.☆59Sep 26, 2017Updated 8 years ago
- TEA cipher in CBC mode written in DRAKON Editor + C as a fun exercise.☆15Jun 6, 2012Updated 13 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A simple and lightweight modal popup library for JS (Javascript). Sturgeon General's warning: "Smoke-pure may be hazardous to your health…☆15Jul 25, 2025Updated 9 months ago
- BLS signature implementation on the BLS12-381 curve that meets the IETF spec.☆17Feb 3, 2026Updated 3 months ago
- An "old TV" post-processing effect for Bevy☆12Mar 7, 2026Updated 2 months ago
- Binary to Go source file converter☆24Dec 30, 2011Updated 14 years ago
- Rust crate for BLS signatures☆32Jul 15, 2024Updated last year
- An AVX/AVX2/x64/pure-Go implementation of the ChaCha20 stream cipher for Golang. [Deprecated].☆11Mar 15, 2018Updated 8 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 9 months ago
- Compact Trie Based Thinglet☆31Aug 17, 2021Updated 4 years ago
- Benchmarking Java fibers for IO usage☆12May 25, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆35Updated this week
- Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.☆14May 2, 2024Updated 2 years ago
- Wrapper providing a safe and simple way to access liburing-sys features.☆19Jun 5, 2019Updated 6 years ago
- Deployments of fancy cryptography☆242Apr 13, 2026Updated last month
- Run a command using sudo, prompting the user with an OS dialog if necessary.☆12Mar 11, 2024Updated 2 years ago
- Visual Hash for matching copies of visually similar images.☆16Mar 17, 2025Updated last year
- Malware analysis and Reverse Engineering Workshops from Invoke RE☆15Jun 30, 2024Updated last year