A lightweight, secure, easy-to-use crypto library suitable for constrained environments.
-
Updated
Oct 20, 2025 - C
8000
A lightweight, secure, easy-to-use crypto library suitable for constrained environments.
SHA-3 and other Keccak related algorithms in SPARK/Ada.
A list of VHDL codes implementing cryptographic algorithms
O(1) Cryptography is an easy to use, hard to misuse Java cryptographic library based on O(1) cryptographic algorithms
Lightweight cryptography
libhydrogen sys bindings for Rust
Optimizing the experimental design of a geoelectric survey in-field
A Java implementation of the Gimli cryptographic permutation and hash algorithm.
libhydrogen wrapper for micropython
Cryptographic constructions based on the Gimli permutation.
A .NET library for symmetric key encryption using the Gimli permutation
A Python implementation of the DES symmetric encryption algorithm, including key schedule generation, Feistel rounds, and standard test vector verification, developed for a data security lab.
Add a description, image, and links to the gimli topic page so that developers can more easily learn about it.
To associate your repository with the gimli topic, visit your repo's landing page and select "manage topics."