Lightweight Cryptography Primitives
|
![]() ![]() | ACE authenticated encryption algorithm |
![]() ![]() | Definitions that are common across AEAD schemes |
![]() ![]() | Utilities that help with the generation of random masking material |
![]() ![]() | Masked ASCON-128 encryption algorithm and related family members |
![]() ![]() | ASCON-128 encryption algorithm and related family members |
![]() ![]() | COMET authenticated encryption algorithm |
![]() ![]() | DryGASCON authenticated encryption algorithm |
![]() ![]() | |
![]() ![]() | Elephant authenticated encryption algorithm family |
![]() ![]() | ESTATE authenticated encryption algorithm |
![]() ![]() | ForkAE authenticated encryption algorithm family |
![]() ![]() | GASCON-128 encryption algorithm and related family members |
![]() ![]() | GIFT-COFB authenticated encryption algorithm (masked version) |
![]() ![]() | GIFT-COFB authenticated encryption algorithm |
![]() ![]() | |
![]() ![]() | Masked version of the Gimli authenticated encryption algorithm |
![]() ![]() | Grain-128AEAD authenticated encryption algorithm |
![]() ![]() | HYENA authenticated encryption algorithm |
![]() ![]() | Masked implementation of the ASCON permutation |
![]() ![]() | Internal implementation of the ASCON permutation |
![]() ![]() | BLAKE2s implementation for performance comparisons |
![]() ![]() | ChaChaPoly implementation for performance comparisons |
![]() ![]() | CHAM block cipher |
![]() ![]() | Internal implementation of DrySPONGE for the DryGASCON cipher |
![]() ![]() | |
![]() ![]() | |
![]() ![]() | ForkSkinny block cipher family |
![]() ![]() | Internal implementation of the GASCON permutation |
![]() ![]() | Configures the variant of GIFT-128 to use |
![]() ![]() | Masked version of the GIFT-128 block cipher |
![]() ![]() | GIFT-128 block cipher |
![]() ![]() | GIFT-64 block cipher |
![]() ![]() | Masked version of the GIMLI-24 permutation |
![]() ![]() | Internal implementation of the GIMLI-24 permutation |
![]() ![]() | Internal implementation of the Grain-128 stream cipher |
![]() ![]() | |
![]() ![]() | Internal implementation of the Keccak-p permutation |
![]() ![]() | Masked implementation of the KNOT permutation |
![]() ![]() | Permutations that are used by the KNOT AEAD and hash algorithms |
![]() ![]() | Utilities that help to implement masked ciphers |
![]() ![]() | |
![]() ![]() | Internal implementation of the PHOTON-256 permutation |
![]() ![]() | Masked version of the Pyjamask block cipher |
![]() ![]() | Pyjamask block cipher |
![]() ![]() | Saturnin block cipher |
![]() ![]() | SimP permutation family |
![]() ![]() | SKINNY-128 block cipher family |
![]() ![]() | Utilities to help implement SKINNY and its variants |
![]() ![]() | Masked version of the sLiSCP-light permutation |
![]() ![]() | SLiSCP-light permutation |
![]() ![]() | Internal implementation of the SPARKLE permutation |
![]() ![]() | SPECK-64 block cipher |
![]() ![]() | Internal implementation of the Spongent-pi permutation |
![]() ![]() | Internal implementation details of the Spook AEAD mode |
![]() ![]() | Internal implementation of the Subterranean block operation |
![]() ![]() | Masked implementation of the TinyJAMBU permutation |
![]() ![]() | Internal implementation of the TinyJAMBU permutation |
![]() ![]() | |
![]() ![]() | Internal implementation of the WAGE permutation |
![]() ![]() | Masked implementation of the Xoodoo permutation |
![]() ![]() | Internal implementation of the Xoodoo permutation |
![]() ![]() | ISAP authenticated encryption algorithm |
![]() ![]() | Masked versions of the KNOT authenticated encryption algorithms |
![]() ![]() | KNOT authenticated encryption and hash algorithms |
![]() ![]() | LOTUS-AEAD and LOCUS-AEAD authenticated encryption algorithms |
![]() ![]() | ORANGE authenticated encryption algorithm |
![]() ![]() | Oribatida authenticated encryption algorithm |
![]() ![]() | PHOTON-Beetle authenticated encryption algorithm |
![]() ![]() | Pyjamask authenticated encryption algorithm (masked version) |
![]() ![]() | Pyjamask authenticated encryption algorithm |
![]() ![]() | Romulus authenticated encryption algorithm family |
![]() ![]() | Saturnin authenticated encryption algorithm |
![]() ![]() | Authenticated encryption based on the SKINNY block cipher |
![]() ![]() | Hash algorithms based on the SKINNY block cipher |
![]() ![]() | Encryption and hash algorithms based on the SPARKLE permutation |
![]() ![]() | Masked version of the SPIX authenticated encryption algorithm |
![]() ![]() | SPIX authenticated encryption algorithm |
![]() ![]() | Masked version of the SpoC authenticated encryption algorithm |
![]() ![]() | SpoC authenticated encryption algorithm |
![]() ![]() | Spook authenticated encryption algorithm (masked version) |
![]() ![]() | Spook authenticated encryption algorithm |
![]() ![]() | Subterranean authenticated encryption algorithm |
![]() ![]() | SUNDAE-GIFT encryption algorithm family |
![]() ![]() | Masked version of the TinyJAMBU authenticated encryption algorithm |
![]() ![]() | TinyJAMBU authenticated encryption algorithm |
![]() ![]() | WAGE authenticated encryption algorithm |
![]() ![]() | Masked version of the Xoodyak authenticated encryption algorithm |
![]() ![]() | Xoodyak authenticated encryption algorithm |