trailofbits / aes-gemLinks
AES Galois Extended Mode
☆14Updated last year
Alternatives and similar repositories for aes-gem
Users that are interested in aes-gem are comparing it to the libraries listed below
Sorting:
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 3 months ago
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- ☆28Updated 3 years ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆12Updated last year
- Elliptic curves Rust reference implementation☆16Updated last year
- Tools for power measurements of post-quantum cryptographic algorithms☆28Updated 5 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆20Updated 4 years ago
- Verifying constant-time code with symbolic execution☆44Updated 3 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆13Updated 2 years ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆30Updated last month
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆12Updated last week
- ☆12Updated last year
- Crypto library☆60Updated last week
- A repository of tools for verifying constant-timeness☆18Updated 3 months ago
- A programming language to write bitsliced ciphers☆56Updated 9 months ago
- Circuits for functions of interest to cryptography☆27Updated last year
- QARMA block cipher in C☆30Updated 2 years ago
- Clang/LLVM patches to zero stack/registers of sensitive functions☆14Updated 7 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆62Updated 11 months ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 10 months ago
- List of crackpot 'scientists' and 'thinkers'☆19Updated last week
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆30Updated 3 months ago
- Differential fuzzing for elliptic curves☆23Updated last year
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 7 months ago
- Formal Analysis of the PQXDH Protocol☆25Updated last year
- A tweakable block cipher☆31Updated last year
- A collection of high-performance crypto implementations.☆51Updated last month