trailofbits / aes-gem
AES Galois Extended Mode
☆14Updated last year
Alternatives and similar repositories for aes-gem
Users that are interested in aes-gem are comparing it to the libraries listed below
Sorting:
- ☆14Updated last month
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 6 months ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- ☆28Updated 3 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16Updated last year
- Elliptic curves Rust reference implementation☆16Updated last year
- Crypto library☆59Updated 2 weeks ago
- ☆13Updated 2 years ago
- Implementation of cryptographic primitives in Go☆12Updated 2 years ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 2 months ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆28Updated last month
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆13Updated 2 years ago
- Optimized Binary GCD for Modular Inversion☆43Updated 4 years ago
- Circuits for functions of interest to cryptography☆27Updated last year
- Banquet implementation☆13Updated 3 years ago
- List of crackpot 'scientists' and 'thinkers'☆16Updated this week
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆82Updated 3 years ago
- Implementations of do255e and do255s in C and assembly☆25Updated 4 years ago
- ☆18Updated last month
- ☆18Updated last year
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆20Updated 4 years ago
- CRYPTOGAMS distribution repository☆56Updated 6 months ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆12Updated last week
- An implementation of Dumer's algorithm for Information Set Decoding.☆14Updated last year
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆12Updated last year
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆61Updated 10 months ago
- Tools for power measurements of post-quantum cryptographic algorithms☆27Updated 5 years ago