unbounded / skein-arm
An implementation of the Skein hash function for ARMv7 with NEON
☆14Updated 13 years ago
Related projects ⓘ
Alternatives and complementary repositories for skein-arm
- SHA-3 finalist (reference code)☆39Updated 10 years ago
- Optimized, portable implementations of BLAKE2b☆24Updated 8 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 6 years ago
- Optimized implementation of the Picnic signature scheme☆79Updated 2 years ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆99Updated 7 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆44Updated 9 years ago
- TLS implemented in f7☆42Updated 8 years ago
- A Skein and Threefish software suite for C, Java, and Go☆69Updated 9 years ago
- Reference implementations (software)☆85Updated 8 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆58Updated last year
- ☆97Updated 8 years ago
- Experiments in high-assurance crypto.☆47Updated last year
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆14Updated 8 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆90Updated 5 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 6 years ago
- Implementations of a fast Elliptic-curve Digital Signature Algorithm☆172Updated 4 years ago
- Fast implementations of the SIMON and SPECK lightweight block ciphers for the SUPERCOP benchmark toolkit. #nsacyber☆45Updated 6 years ago
- Optimized block functions for the ChaCha stream cipher☆47Updated 4 years ago
- Cymric - Portable secure random number generator☆20Updated 10 years ago
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆59Updated 8 years ago
- An implementation of the IETF QUIC protocol in F*☆18Updated 5 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆27Updated 6 years ago
- Experiments in homomorphic encryption☆31Updated 9 years ago
- CRYPTOGAMS distribution repository☆56Updated 2 weeks ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆81Updated 2 years ago
- AVX2 Chacha implementation☆16Updated 10 years ago