☆55Jun 20, 2024Updated last year
Alternatives and similar repositories for Lightweight-Cryptography-Benchmarking
Users that are interested in Lightweight-Cryptography-Benchmarking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NIST Lightweight Cryptography Primitives☆55Jun 10, 2022Updated 3 years ago
- Development Package for the Hardware API for Lightweight Cryptography☆18Mar 27, 2025Updated last year
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆41Nov 17, 2024Updated last year
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- Fast constant-time AES implementations on 32-bit architectures☆71Oct 17, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Hardware implementations of the authenticated encryption design ASCON☆21Aug 21, 2017Updated 8 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- A collection of Ascon implementations & documents (as submodules)☆56Mar 30, 2026Updated last month
- ☆10Apr 18, 2017Updated 9 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- Finalists to the NIST lightweight cryptography competition☆39Jun 29, 2022Updated 3 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆105Mar 29, 2026Updated last month
- NIST LWC Hardware Reference Implementation of Ascon v1.2☆35Aug 29, 2023Updated 2 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆33Jan 17, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Ascon-Based Lightweight Cryptography Primitives for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions☆20Aug 15, 2025Updated 8 months ago
- This is repository for python implementation of TFHE. We are plannning to use numpy and CuPy to support GPU accelaration.☆18Oct 24, 2020Updated 5 years ago
- ☆14Mar 3, 2021Updated 5 years ago
- Bitsliced Implementations of Block Ciphers on AVR 8-bit Microcontrollers☆14Nov 21, 2016Updated 9 years ago
- Hardware designs for fault detection☆21Apr 13, 2020Updated 6 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Feb 23, 2023Updated 3 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 4 years ago
- Source codes for paper "An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independe…☆18Aug 29, 2020Updated 5 years ago
- A depth-aware secure computation compiler☆17Jun 7, 2025Updated 10 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- AES Galois Extended Mode☆24Feb 9, 2026Updated 2 months ago
- Assignments for the cryptography engineering course☆12Dec 17, 2013Updated 12 years ago
- ☆86Nov 18, 2025Updated 5 months ago
- ☆17Nov 20, 2017Updated 8 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- Source code developed in the BLOC project☆20Apr 19, 2019Updated 7 years ago
- SKINNY tweakable block cipher☆22Jan 24, 2024Updated 2 years ago
- Bosphorus, ANF simplifier and solver, and ANF-to-CNF converter☆81Apr 6, 2025Updated last year
- 🔒 Pure Go GOST Security Suite☆12Dec 10, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Repository code to support paper TCHES2020 paper "Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based …☆14Oct 29, 2020Updated 5 years ago
- Encoding different problems into Boolean satisfiability☆12Sep 29, 2022Updated 3 years ago
- Various RTL design blocks along with verification testbenches with SVAs. Designed using SystemVerilog☆27Aug 11, 2022Updated 3 years ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆46Nov 18, 2024Updated last year
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆32Oct 14, 2020Updated 5 years ago
- Logic Minimization in Python☆26Mar 25, 2026Updated last month
- ☆15Sep 7, 2020Updated 5 years ago