veorq / Quark
Lightweight cryptographic hash functions (reference code)
☆16Updated 10 years ago
Alternatives and similar repositories for Quark:
Users that are interested in Quark are comparing it to the libraries listed below
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 7 years ago
- Source code for the experimental, compact "wee" file compression utility.☆12Updated 4 years ago
- SHA-3 finalist (reference code)☆39Updated 10 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆44Updated 10 years ago
- Authenticated Blowfish-encrypted pipe☆23Updated 7 years ago
- C version of the MetroHash function☆25Updated 9 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- A fast secure userspace pseudorandom number generator☆82Updated 10 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 6 years ago
- empirical measurement of code constructs that seem like they should have constant execution time regardless of values of inputs☆9Updated 9 years ago
- Source code for the article "A bug story: data alignment on x86"☆15Updated 8 years ago
- Optimized block functions for the ChaCha stream cipher☆49Updated 5 years ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆27Updated 9 years ago
- Tools for testing C compilers for the correct handling of volatile objects.☆26Updated 10 years ago
- SipHash AVX2 implementation in C☆15Updated 9 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- Dictionary implemented through a skiplist☆15Updated 10 years ago
- Reference Implementation of Catena, a memory-consuming password scrambler☆31Updated 6 years ago
- Reference implementations (software)☆85Updated 8 years ago
- Yet another C standard library☆16Updated 4 months ago
- AVX-512 utilities☆19Updated 10 years ago
- Register-based VM, and debugger written in C, and a stack-based VM written inside the first.☆50Updated 6 years ago
- Bag ADT written in C so that you can take randomly, licensed under a BSD license☆13Updated 8 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 6 years ago
- Xoocycle, a C90 implementation of the Xoodyak hash and AEAD construction☆10Updated 5 years ago
- r4 Virtual Machine in many version, last is "r4wine2" for win, "r4a" is android.☆13Updated 5 years ago
- A deceptively simple way to add a configuration file to a command-line application.☆11Updated 3 weeks ago
- Symmetric ciphers, hashes, microtime, random strings, big integers, and zlib compression☆25Updated 9 years ago
- A small C like scripting language with a few small novel features.☆28Updated 8 years ago
- Easy, flexible C unit testing☆11Updated 9 years ago