tiny-keccak
Keccak implementation
An implementation of Keccak derived functions with various features and optimizations.
An implementation of Keccak derived functions specified in FIPS-202, SP800-185 and KangarooTwelve
196 stars
9 watching
50 forks
Language: Rust
last commit: over 1 year ago
Linked from 1 awesome list
cryptographycshakefips-202kangarootwelvekeccakkmacparallelhashrustsha3shaketuplehash
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A library implementing cryptographic algorithms using the SPARK/Ada programming language and static proof of type safety. | 33 |
| | An implementation of a cryptographic primitive for message processing and key expansion | 32 |
| | A collection of cryptographic schemes and utilities for building secure applications | 593 |
| | Provides C bindings to Colin Percival's scrypt implementation for secure key derivation | 18 |
| | Exploring the development of a cryptographic protocol from scratch to production-ready implementation | 156 |
| | A library to demonstrate the recursive capabilities of the preprocessor in C. | 924 |
| | A C++ library providing a flexible and universal API for various cryptographic hash functions | 198 |
| | A Smalltalk-based wrapper around the Keras deep learning framework | 6 |
| | Tools for implementing various hash algorithms in multiple programming languages. | 87 |
| | A high-performance Rust implementation of Bulletproofs, enabling efficient single-party and multi-party computations with programmable constraints. | 1,058 |
| | A simple, C-like programming language compiler written in Rust to learn the basics of compilers and language processing | 295 |
| | A Rust implementation of PLONK proving system with optimized performance and genericity for curve types | 295 |
| | A language and runtime environment for partially invertible computation, focusing on linear typing and reversible programming. | 10 |
| | A tiny Python library for collaborative secure multi-party computation on private data | 87 |
| | An example C program demonstrating common types of vulnerabilities, designed to be fuzzed using various tools. | 681 |