|
Lightweight Cryptography Primitives
|
| ACE authenticated encryption algorithm | |
| Definitions that are common across AEAD schemes | |
| Utilities that help with the generation of random masking material | |
| Masked ASCON-128 encryption algorithm and related family members | |
| ASCON-128 encryption algorithm and related family members | |
| COMET authenticated encryption algorithm | |
| DryGASCON authenticated encryption algorithm | |
| Elephant authenticated encryption algorithm family | |
| ESTATE authenticated encryption algorithm | |
| ForkAE authenticated encryption algorithm family | |
| GASCON-128 encryption algorithm and related family members | |
| GIFT-COFB authenticated encryption algorithm (masked version) | |
| GIFT-COFB authenticated encryption algorithm | |
| Masked version of the Gimli authenticated encryption algorithm | |
| Grain-128AEAD authenticated encryption algorithm | |
| HYENA authenticated encryption algorithm | |
| Masked implementation of the ASCON permutation | |
| Internal implementation of the ASCON permutation | |
| BLAKE2s implementation for performance comparisons | |
| ChaChaPoly implementation for performance comparisons | |
| CHAM block cipher | |
| Internal implementation of DrySPONGE for the DryGASCON cipher | |
| ForkSkinny block cipher family | |
| Internal implementation of the GASCON permutation | |
| Configures the variant of GIFT-128 to use | |
| Masked version of the GIFT-128 block cipher | |
| GIFT-128 block cipher | |
| GIFT-64 block cipher | |
| Masked version of the GIMLI-24 permutation | |
| Internal implementation of the GIMLI-24 permutation | |
| Internal implementation of the Grain-128 stream cipher | |
| Internal implementation of the Keccak-p permutation | |
| Masked implementation of the KNOT permutation | |
| Permutations that are used by the KNOT AEAD and hash algorithms | |
| Utilities that help to implement masked ciphers | |
| Internal implementation of the PHOTON-256 permutation | |
| Masked version of the Pyjamask block cipher | |
| Pyjamask block cipher | |
| Saturnin block cipher | |
| SimP permutation family | |
| SKINNY-128 block cipher family | |
| Utilities to help implement SKINNY and its variants | |
| Masked version of the sLiSCP-light permutation | |
| SLiSCP-light permutation | |
| Internal implementation of the SPARKLE permutation | |
| SPECK-64 block cipher | |
| Internal implementation of the Spongent-pi permutation | |
| Internal implementation details of the Spook AEAD mode | |
| Internal implementation of the Subterranean block operation | |
| Masked implementation of the TinyJAMBU permutation | |
| Internal implementation of the TinyJAMBU permutation | |
| Internal implementation of the WAGE permutation | |
| Masked implementation of the Xoodoo permutation | |
| Internal implementation of the Xoodoo permutation | |
| ISAP authenticated encryption algorithm | |
| Masked versions of the KNOT authenticated encryption algorithms | |
| KNOT authenticated encryption and hash algorithms | |
| LOTUS-AEAD and LOCUS-AEAD authenticated encryption algorithms | |
| ORANGE authenticated encryption algorithm | |
| Oribatida authenticated encryption algorithm | |
| PHOTON-Beetle authenticated encryption algorithm | |
| Pyjamask authenticated encryption algorithm (masked version) | |
| Pyjamask authenticated encryption algorithm | |
| Romulus authenticated encryption algorithm family | |
| Saturnin authenticated encryption algorithm | |
| Authenticated encryption based on the SKINNY block cipher | |
| Hash algorithms based on the SKINNY block cipher | |
| Encryption and hash algorithms based on the SPARKLE permutation | |
| Masked version of the SPIX authenticated encryption algorithm | |
| SPIX authenticated encryption algorithm | |
| Masked version of the SpoC authenticated encryption algorithm | |
| SpoC authenticated encryption algorithm | |
| Spook authenticated encryption algorithm (masked version) | |
| Spook authenticated encryption algorithm | |
| Subterranean authenticated encryption algorithm | |
| SUNDAE-GIFT encryption algorithm family | |
| Masked version of the TinyJAMBU authenticated encryption algorithm | |
| TinyJAMBU authenticated encryption algorithm | |
| WAGE authenticated encryption algorithm | |
| Masked version of the Xoodyak authenticated encryption algorithm | |
| Xoodyak authenticated encryption algorithm |
1.8.6