stream-ciphers
stream-ciphers copied to clipboard
Collection of stream cipher algorithms
Maybe we could have a feature to ignore MSRV, that is not activated by default
In #276 they have been left for a later PR. - [x] SSE2 - [x] AVX2 - [ ] Neon
#219 This implementation of HC-128 does not yet have the test vectors. HC-256 was using a table size of 2660 instead of 2560, this does not cause issue with the...
- [ ] [HC-128](https://www.ecrypt.eu.org/stream/p3ciphers/hc/hc128_p3.pdf)
There are two big optimizations we could do on both the `chacha20` and `salsa20` crates. ## Avoid recomputing initial state *EDIT: both crates now have a `new` method to compute...
Here i re-added the SSE2 with the caveat of variants. - Reverts https://github.com/RustCrypto/stream-ciphers/pull/346 - https://github.com/RustCrypto/stream-ciphers/commit/be4cdb3c965db975e12f568a0c76df3cc4dfefa4 - Add regression tests created in https://github.com/RustCrypto/stream-ciphers/pull/346 - https://github.com/RustCrypto/stream-ciphers/commit/f0781db2ab566d9fad9e11bb8f4b3c7df969e843 - Add the soft fallback for...
I borrowed some code from version `0.8.1` of `chacha20`, as well as `rand_chacha` and was able to get it to compile and pass tests. The main issues in my code...
I've noticed that #333 is missing `zeroize` for the SIMD backends, and that the `zeroize` crate seems to support SIMD registers. There are 2 ways that I can identify for...
The `ChaCha20Legacy` construction, i.e. the djb variant, is supposed to use a 64-bit counter but currently uses a 32-bit counter because it shares its core implementation with the IETF construction...