Lightweight Cryptography Primitives
 All Data Structures Files Functions Variables Typedefs Macros Pages
File List
Here is a list of all documented files with brief descriptions:
o*ace.hACE authenticated encryption algorithm
o*aead-common.hDefinitions that are common across AEAD schemes
o*aead-random.hUtilities that help with the generation of random masking material
o*ascon128-masked.hMasked ASCON-128 encryption algorithm and related family members
o*ascon128.hASCON-128 encryption algorithm and related family members
o*comet.hCOMET authenticated encryption algorithm
o*drygascon.hDryGASCON authenticated encryption algorithm
o*drygascon128_arm_selector.h
o*elephant.hElephant authenticated encryption algorithm family
o*estate.hESTATE authenticated encryption algorithm
o*forkae.hForkAE authenticated encryption algorithm family
o*gascon128.hGASCON-128 encryption algorithm and related family members
o*gift-cofb-masked.hGIFT-COFB authenticated encryption algorithm (masked version)
o*gift-cofb.hGIFT-COFB authenticated encryption algorithm
o*gimli24-masked.h
o*gimli24.hMasked version of the Gimli authenticated encryption algorithm
o*grain128.hGrain-128AEAD authenticated encryption algorithm
o*hyena.hHYENA authenticated encryption algorithm
o*internal-ascon-m.hMasked implementation of the ASCON permutation
o*internal-ascon.hInternal implementation of the ASCON permutation
o*internal-blake2s.hBLAKE2s implementation for performance comparisons
o*internal-chachapoly.hChaChaPoly implementation for performance comparisons
o*internal-cham.hCHAM block cipher
o*internal-drysponge.hInternal implementation of DrySPONGE for the DryGASCON cipher
o*internal-forkae-paef.h
o*internal-forkae-saef.h
o*internal-forkskinny.hForkSkinny block cipher family
o*internal-gascon.hInternal implementation of the GASCON permutation
o*internal-gift128-config.hConfigures the variant of GIFT-128 to use
o*internal-gift128-m.hMasked version of the GIFT-128 block cipher
o*internal-gift128.hGIFT-128 block cipher
o*internal-gift64.hGIFT-64 block cipher
o*internal-gimli24-m.hMasked version of the GIMLI-24 permutation
o*internal-gimli24.hInternal implementation of the GIMLI-24 permutation
o*internal-grain128.hInternal implementation of the Grain-128 stream cipher
o*internal-isap.h
o*internal-keccak.hInternal implementation of the Keccak-p permutation
o*internal-knot-m.hMasked implementation of the KNOT permutation
o*internal-knot.hPermutations that are used by the KNOT AEAD and hash algorithms
o*internal-masking.hUtilities that help to implement masked ciphers
o*internal-ocb.h
o*internal-photon256.hInternal implementation of the PHOTON-256 permutation
o*internal-pyjamask-m.hMasked version of the Pyjamask block cipher
o*internal-pyjamask.hPyjamask block cipher
o*internal-saturnin.hSaturnin block cipher
o*internal-simp.hSimP permutation family
o*internal-skinny128.hSKINNY-128 block cipher family
o*internal-skinnyutil.hUtilities to help implement SKINNY and its variants
o*internal-sliscp-light-m.hMasked version of the sLiSCP-light permutation
o*internal-sliscp-light.hSLiSCP-light permutation
o*internal-sparkle.hInternal implementation of the SPARKLE permutation
o*internal-speck64.hSPECK-64 block cipher
o*internal-spongent.hInternal implementation of the Spongent-pi permutation
o*internal-spook.hInternal implementation details of the Spook AEAD mode
o*internal-subterranean.hInternal implementation of the Subterranean block operation
o*internal-tinyjambu-m.hMasked implementation of the TinyJAMBU permutation
o*internal-tinyjambu.hInternal implementation of the TinyJAMBU permutation
o*internal-util.h
o*internal-wage.hInternal implementation of the WAGE permutation
o*internal-xoodoo-m.hMasked implementation of the Xoodoo permutation
o*internal-xoodoo.hInternal implementation of the Xoodoo permutation
o*isap.hISAP authenticated encryption algorithm
o*knot-masked.hMasked versions of the KNOT authenticated encryption algorithms
o*knot.hKNOT authenticated encryption and hash algorithms
o*lotus-locus.hLOTUS-AEAD and LOCUS-AEAD authenticated encryption algorithms
o*orange.hORANGE authenticated encryption algorithm
o*oribatida.hOribatida authenticated encryption algorithm
o*photon-beetle.hPHOTON-Beetle authenticated encryption algorithm
o*pyjamask-masked.hPyjamask authenticated encryption algorithm (masked version)
o*pyjamask.hPyjamask authenticated encryption algorithm
o*romulus.hRomulus authenticated encryption algorithm family
o*saturnin.hSaturnin authenticated encryption algorithm
o*skinny-aead.hAuthenticated encryption based on the SKINNY block cipher
o*skinny-hash.hHash algorithms based on the SKINNY block cipher
o*sparkle.hEncryption and hash algorithms based on the SPARKLE permutation
o*spix-masked.hMasked version of the SPIX authenticated encryption algorithm
o*spix.hSPIX authenticated encryption algorithm
o*spoc-masked.hMasked version of the SpoC authenticated encryption algorithm
o*spoc.hSpoC authenticated encryption algorithm
o*spook-masked.hSpook authenticated encryption algorithm (masked version)
o*spook.hSpook authenticated encryption algorithm
o*subterranean.hSubterranean authenticated encryption algorithm
o*sundae-gift.hSUNDAE-GIFT encryption algorithm family
o*tinyjambu-masked.hMasked version of the TinyJAMBU authenticated encryption algorithm
o*tinyjambu.hTinyJAMBU authenticated encryption algorithm
o*wage.hWAGE authenticated encryption algorithm
o*xoodyak-masked.hMasked version of the Xoodyak authenticated encryption algorithm
\*xoodyak.hXoodyak authenticated encryption algorithm