Lightweight Cryptography Primitives
 All Data Structures Files Functions Variables Typedefs Macros Pages
File List
Here is a list of all documented files with brief descriptions:
o*aead-metadata.hMetadata defintions for AEAD and hashing schemes
o*aead-random.hUtilities that help with the generation of random masking data
o*aesgcm-aead.hAES-GCM Authenticated Encryption with Associated Data
o*ascon-aead-masked.hMasked ASCON-128 encryption algorithm and related family members
o*ascon-aead.hASCON-128 encryption algorithm and related family members
o*ascon-hash.hASCON-HASH and ASCON-HASHA hash algorithms
o*ascon-hkdf.hHMAC-based key derivation function based on ASCON-HMAC
o*ascon-hmac.hHashed Message Authentication Code (HMAC) based on ASCON-HASH
o*ascon-kmac.hKeyed Message Authentication Code (KMAC) based on ASCON-XOF
o*ascon-pbkdf2.hPassword-based key derivation function based on ASCON-HMAC
o*ascon-permutation.hAPI for raw access to the ASCON permutation
o*ascon-prng.hPseudorandom number generator (PRNG) built around ASCON
o*ascon-siv.hSIV encryption primitives built around the ASCON permutation
o*ascon-xof.h
o*elephant-delirium.hDelirium authenticated encryption algorithm
o*elephant-dumbo.hDumbo authenticated encryption algorithm
o*elephant-jumbo.hJumbo authenticated encryption algorithm
o*elephant-prng.hPseudorandom number generator (PRNG) for Elephant
o*gift-bc.hGIFT-128 block cipher
o*gift-cofb-aead-masked.hGIFT-COFB authenticated encryption algorithm (masked version)
o*gift-cofb-aead.hGIFT-COFB authenticated encryption algorithm
o*gift-prng.hPseudorandom number generator (PRNG) for GIFT-128
o*grain-aead.hGrain-128AEAD authenticated encryption algorithm
o*grain-prng.hPseudorandom number generator (PRNG) built around Grain-128
o*internal-aes.hAES block cipher
o*internal-ascon-m2.hMasked implementation of the ASCON permutation with 2 shares
o*internal-ascon.hInternal implementation of the ASCON permutation
o*internal-blake2s.hBLAKE2s implementation for performance comparisons
o*internal-chachapoly.hChaChaPoly implementation for performance comparisons
o*internal-elephant.h
o*internal-ghash.hGHASH algorithm for supporting GCM mode
o*internal-gift128-config.hConfigures the variant of GIFT-128 to use
o*internal-gift128-m.hMasked version of the GIFT-128 block cipher
o*internal-gift128.hGIFT-128 block cipher
o*internal-grain128.hInternal implementation of the Grain-128 stream cipher
o*internal-hkdf.h
o*internal-hmac.h
o*internal-isap-pk.h
o*internal-isap.h
o*internal-keccakp-200.hInternal implementation of the Keccak-p[200] permutation
o*internal-keccakp-400.hInternal implementation of the Keccak-p[400] permutation
o*internal-kmac.h
o*internal-masking.hUtilities that help to implement masked ciphers
o*internal-pbkdf2.h
o*internal-photon256-mix.hMacros to help mixing the columns in the PHOTON-256 permutation
o*internal-photon256.hInternal implementation of the PHOTON-256 permutation
o*internal-romulus.hCommon functions for Romulus AEAD modes
o*internal-sha256.hSHA256 implementation for performance comparisons
o*internal-skinny-plus-config.hConfigures the variant of SKINNY-128-384+ to use
o*internal-skinny-plus.hSKINNY-128-384+ block cipher
o*internal-sparkle.hInternal implementation of the SPARKLE permutation
o*internal-spongent.hInternal implementation of the Spongent-pi permutation
o*internal-tinyjambu-m.hMasked implementation of the TinyJAMBU permutation
o*internal-tinyjambu.hInternal implementation of the TinyJAMBU permutation
o*internal-util.h
o*internal-xoodoo-m.hMasked implementation of the Xoodoo permutation
o*internal-xoodoo.hInternal implementation of the Xoodoo permutation
o*isap-a-aead-pk.hISAP-A authenticated encryption algorithm with pre-computed keys
o*isap-a-aead.hISAP-A authenticated encryption algorithm
o*isap-k-aead-pk.hISAP-K authenticated encryption algorithm with pre-computed keys
o*isap-k-aead.hISAP authenticated encryption algorithm
o*photon-beetle-aead.hPHOTON-Beetle authenticated encryption algorithm
o*photon-beetle-hash.hPHOTON-Beetle hash algorithm
o*photon-beetle-hkdf.hHMAC-based key derivation function based on PHOTON-Beetle-HMAC
o*photon-beetle-hmac.hHashed Message Authentication Code (HMAC) based on PHOTON-Beetle-Hash
o*photon-beetle-pbkdf2.hPassword-based key derivation function based on PHOTON-Beetle-HMAC
o*photon-beetle-prng.hPseudorandom number generator (PRNG) for PHOTON-Beetle
o*romulus-hash.hRomulus-H hash algorithm
o*romulus-hkdf.hHMAC-based key derivation function based on Romulus-HMAC
o*romulus-hmac.hHashed Message Authentication Code (HMAC) based on Romulus-H
o*romulus-kmac.hKeyed Message Authentication Code (KMAC) based on Romulus-H
o*romulus-m-aead.hRomulus-M authenticated encryption algorithm
o*romulus-n-aead.hRomulus-N authenticated encryption algorithm
o*romulus-pbkdf2.hPassword-based key derivation function based on Romulus-HMAC
o*romulus-prng.hPseudorandom number generator (PRNG) for Romulus
o*romulus-t-aead.hRomulus-T authenticated encryption algorithm
o*romulus-xof.hExtensible Output Function (XOF) based on Romulus-H
o*skinny-plus-bc.hSKINNY-128-384+ block cipher
o*sparkle-aead.hEncryption algorithms based on the SPARKLE permutation
o*sparkle-hash.hHash algorithms based on the SPARKLE permutation
o*sparkle-hkdf.hHMAC-based key derivation function based on SPARKLE-HMAC
o*sparkle-hmac.hHashed Message Authentication Code (HMAC) based on SPARKLE
o*sparkle-kmac.hKeyed Message Authentication Code (KMAC) based on XOEsch256
o*sparkle-pbkdf2.hPassword-based key derivation function based on SPARKLE-HMAC
o*sparkle-prng.hPseudorandom number generator (PRNG) built around SPARKLE
o*tinyjambu-aead-masked.hMasked version of the TinyJAMBU authenticated encryption algorithm
o*tinyjambu-aead.hTinyJAMBU authenticated encryption algorithm
o*tinyjambu-prng.hPseudorandom number generator (PRNG) for TinyJAMBU
o*xoodyak-aead.hXoodyak authenticated encryption algorithm
o*xoodyak-hash.hXoodyak-Hash hash algorithm
o*xoodyak-hkdf.hHMAC-based key derivation function based on Xoodyak-HMAC
o*xoodyak-hmac.hHashed Message Authentication Code (HMAC) based on Xoodyak-Hash
o*xoodyak-kmac.hKeyed Message Authentication Code (KMAC) based on Xoodyak
o*xoodyak-masked.hMasked version of the Xoodyak authenticated encryption algorithm
o*xoodyak-pbkdf2.hPassword-based key derivation function based on Xoodyak-HMAC
\*xoodyak-prng.hPseudorandom number generator (PRNG) built around Xoodoo