1301:
1280:, and the individual files in it, which are public domain. The library is copyrighted as a compilation in order to place certain disclaimers (regarding warranty, export, and patents) in the license and to keep the attributions and public domain declarations intact when Crypto++ is distributed in source code form. The fact that individual files are public domain means that legally you can place code segments, entire files, or small sets of files (up to the limit set by fair use) into your own project and do anything you want with them without worrying about the copyright.
107:
27:
979:
Furthermore, the library retains a collection of insecure or obsolescent algorithms for backward compatibility and historical value: MD2, MD4, MD5, Panama Hash, DES, ARC4, SEAL 3.0, WAKE, WAKE-OFB, DESX (DES-XEX3), RC2, SAFER, 3-WAY, GOST, SHARK, CAST-128, and Square.
975:
The library also makes available primitives for number-theoretic operations such as fast multi-precision integers; prime number generation and verification; finite field arithmetic, including GF(p) and GF(2); elliptical curves; and polynomial operations.
1059:
Crypto++ 1.0 was released in June 1995. Since its initial release, the library has seen nearly two dozen revisions, including an architectural change in version 5.0. There have been ten releases using the version 5.0 architecture since March 2009.
820:
966:
1000:, Ashraf Abusharekh and Kris Kaj found that "Crypto++ 5.1 leads in terms of support for cryptographic primitives and schemes, but is the slowest of all investigated libraries."
390:
Additionally, the Crypto++ library sometimes makes proposed and bleeding-edge algorithms and implementations available for study by the cryptographic community. For example,
225:. Crypto++ has been widely used in academia, student projects, open-source, and non-commercial projects, as well as businesses. Released in 1995, the library fully supports
1014:, Crypto++ 5.5.2 was the top-performing library under two block ciphers and did not rank below the average library performance under the remaining block ciphers.
1427:
637:
714:
432:
2033:
815:
1598:
549:
339:
Crypto++ ordinarily provides complete cryptographic implementations and often includes less popular, less frequently-used schemes. For example,
613:
368:
344:
625:
617:
440:
629:
1779:
1380:
914:
910:
834:
633:
1191:
882:
878:
846:
842:
553:
160:
934:
384:
323:
Crypto++ 1.0 was released in June 1995, but the download is no longer available. The Crypto++ 1.0 release was withdrawn due to
1324:
1306:
505:
1272:
The
License of Crypto++ is somewhat unusual amongst open source projects. A distinction is made between the library as a
1182:
Lawrence Teo's compilation of previous Crypto++ releases dating back to 1995 can be found in the users group archives.
857:
285:
1350:
2023:
783:
2028:
1435:
139:
1606:. ECRYPT Workshop on Software Performance Enhancement for Encryption and Decryption. pp. 3–19. Archived from
2013:
894:
608:
399:
280:. The project also supports compilation using C++03, C++11, C++14, and C++17 runtime libraries; and a variety of
1992:
1481:"Japan's First 128-bit Block Cipher 'Camellia' Approved as a New Standard Encryption Algorithm in the Internet"
867:
1249:
428:
423:
1803:
1682:
1607:
681:
1927:
1902:
1877:
1044:
1036:
685:
495:
360:
86:
1849:
925:
906:
902:
898:
807:
725:
693:
395:
60:
962:
265:
211:
144:
1825:
1754:
1704:
1505:
1480:
593:
2018:
1273:
644:
364:
1632:
798:
791:
770:
317:
305:
2038:
889:
668:
156:
1032:
730:
472:
233:
830:
1550:
1387:
1004:
754:
309:
204:
8:
1265:
1007:
997:
750:
653:
621:
513:
106:
328:
1406:
1017:
Crypto++ also includes an auto-benchmarking feature, available from the command line (
1051:
throughput increases from approximately 28.0 cycles per byte to 3.5 cycles per byte.
661:
585:
545:
541:
340:
324:
269:
1633:"Speedtest and Comparison of Open-Source Cryptography Libraries and Compiler Flags"
1540:
1319:
1314:
521:
444:
151:
127:
1998:
803:
476:
464:
460:
1553:
1536:
Elliptic Curve
Cryptography (ECC) Brainpool Standard Curves and Curve Generation
1534:
1346:
957:
826:
581:
577:
436:
403:
132:
2007:
1728:
1261:
718:
589:
537:
455:
380:
293:
289:
273:
164:
1028:
As with many other cryptographic libraries available for 32-bit and 64-bit
1011:
557:
532:
356:
313:
215:
1656:
1361:
301:
236:
for many major operating systems and platforms, including
Android (using
1404:
1252:
in 2016. The move effectively means the library is no longer validated.
1194:(FIPS) 140-2 Level 1 module validations with no post-validation issues.
1987:
993:
875:
850:
565:
277:
241:
218:
95:
34:
1952:
1600:
Comparative
Analysis of Software Libraries for Public Key Cryptography
1458:
1545:
758:
597:
484:
281:
1344:
26:
1048:
657:
649:
573:
525:
501:
488:
1928:"Validated FIPS 140-1 and FIPS 140-2 Cryptographic Modules (2007)"
1903:"Validated FIPS 140-1 and FIPS 140-2 Cryptographic Modules (2005)"
1878:"Validated FIPS 140-1 and FIPS 140-2 Cryptographic Modules (2003)"
1705:"Misdetection of MIPS endianness & How to get fast AES calls?"
1277:
950:
811:
710:
517:
480:
253:
237:
222:
40:
331:. All other versions of the library are available for download.
1040:
989:
918:
787:
779:
775:
762:
734:
468:
448:
372:
348:
249:
230:
226:
1378:
1043:. With AES-NI, AES performance improves dramatically: 128-bit
1003:
In 2008, speed tests carried out by Timo
Bingmann using seven
946:
938:
930:
838:
742:
738:
406:
in RFC 5639, were added to Crypto++ 5.6.0 in the same month.
297:
261:
257:
207:
120:
1573:
1504:
Hartikainen, Arsi; Toivanen, Timo; Kiljunen, Herkko (2005).
175:
1980:
1503:
1285:
942:
871:
863:
746:
706:
702:
698:
677:
673:
601:
569:
391:
376:
352:
1351:"Cryptanalytic Attacks on Pseudorandom Number Generators"
1029:
561:
509:
245:
398:, was added to the library during its submission to the
1358:
Fast
Software Encryption, 5th International Proceedings
1336:
402:; and Brainpool curves, proposed in March 2009 as an
1296:
400:
1596:
1414:. Computer Security Applications Conference (ACSAC)
1850:"Crypto++ Library Versions 5.3.0 Security Policy"
1405:X. Yinglian; M. K. Reiter; D. O'Hallaron (2006).
1264:files, with a compilation copyright and a single
2005:
1702:
1680:
1381:"OLSR: Distributed Key Management for Security"
1260:As of version 5.6.1, Crypto++ consists of only
1932:Cryptographic Module Validation Program (CMVP)
1907:Cryptographic Module Validation Program (CMVP)
1882:Cryptographic Module Validation Program (CMVP)
1857:Cryptographic Module Validation Program (CMVP)
1408:Protecting Privacy in Key-Value Search Systems
1532:
1995:(Includes nonprofit and for profit projects)
1777:
1752:
1425:
1276:(i.e., collection), which is copyrighted by
1630:
1513:Secure Communications, Seminar Presentation
1379:C. Adjih; D. Raffo; P. Mühlethaler (2004).
1035:, Crypto++ includes assembly routines for
105:
25:
1544:
1021:), the results of which are available at
1432:Technion, Israel Institute of Technology
410:Crypto++ algorithms and implementations
2034:Public-domain software with source code
1515:. Lappeenranta University of Technology
1192:Federal Information Processing Standard
967:Rabin's information dispersal algorithm
771:Password based key derivation functions
2006:
1823:
858:Padding schemes for public-key systems
1729:"Crypto++ 5.6.0 Pentium 4 Benchmarks"
1953:"Compilation Copyright for Crypto++"
1826:"Release Dates of Previous Versions"
1428:"Optimizing Crypto++ library for P4"
1325:Comparison of cryptography libraries
1307:Free and open-source software portal
1064:Crypto++ releases since version 6.0
897:(DH), Unified Diffie–Hellman (DH2),
387:; both are included in the library.
1231:2005-07-29, 2005-08-24, 2005-10-28
1185:
1054:
13:
1993:List of projects that use Crypto++
14:
2050:
1972:
1248:Crypto++ was moved to the CMVP's
43:, the Crypto++ project since 2015
1533:Lochter, M.; Merkle, J. (2009).
1299:
1198:FIPS validated Crypto++ modules
1945:
1920:
1895:
1870:
1842:
1817:
1796:
1771:
1746:
1721:
1696:
1674:
1268:for the compilation copyright:
609:Block cipher modes of operation
1649:
1624:
1597:A. Abusharekh; K. Kaj (2007).
1590:
1566:
1526:
1497:
1473:
1451:
983:
963:Shamir's secret sharing scheme
645:Authenticated encryption modes
424:Pseudorandom number generators
418:Algorithms or Implementations
327:asserting its patent over the
163:) / individual files into the
1:
1804:"Crypto++ Announcements List"
1755:"Crypto++ 5.0 beta available"
1683:"AES-NI Performance Analyzed"
1461:. Crypto++ Project. June 1995
1349:; D. Wagner; C. Hall (1998).
1330:
669:Block ciphers padding schemes
334:
66:8.9 / October 1, 2023
1506:"Whirlpool hashing function"
1255:
1190:Crypto++ has received three
694:Message authentication codes
7:
1703:T. Krovetz; W. Dai (2010).
1681:P. Schmid; A. Roos (2010).
1657:"Crypto++ 5.6.0 Benchmarks"
1292:
1216:
1213:
1196:
1175:
1167:
1159:
1151:
1143:
1135:
1127:
1119:
1111:
1103:
1095:
1087:
1079:
1062:
992:workshop paper focusing on
926:Elliptic-curve cryptography
726:Cryptographic hash function
408:
396:message authentication code
10:
2055:
1250:Historical Validation List
792:Krawczyk and Eronen's HKDF
1023:Crypto++ 5.6.0 Benchmarks
996:implementations of eight
456:High speed stream ciphers
394:, a universal hash-based
308:(including Apple's GCC),
170:
150:
138:
126:
116:
85:
81:
59:
55:
47:
33:
24:
2024:Cryptographic algorithms
556:, Kalyna (128/256/512),
310:Intel C++ Compiler (ICC)
2029:Free computer libraries
1988:Crypto++ GitHub project
1242:2007-08-13, 2007-08-17
1220:2003-09-05, 2005-10-28
799:Public-key cryptography
745:(SHA-224/256/384/512),
733:(BLAKE2b and BLAKE2s),
465:ChaCha20 (IETF version)
221:and schemes written by
68:; 11 months ago
2014:Cryptographic software
1574:"Crypto++ Library 8.6"
1290:
415:Primitive or Operation
383:roughly equivalent to
359:roughly equivalent to
325:RSA Data Security, Inc
314:Microsoft Visual C/C++
157:Boost Software License
1830:Crypto++ Mailing List
1784:Crypto++ Mailing List
1780:"Crypto++ 5.0 update"
1778:Announcement (2002).
1759:Crypto++ Mailing List
1753:Announcement (2002).
1426:T. Zidenberg (2010).
1270:
890:Key agreement schemes
1999:Crypto++ users group
1637:Timo Bingmann Weblog
1631:T. Bingmann (2008).
1459:"Crypto++ Downloads"
16:C++ software library
1709:Crypto++ user group
1266:open source license
1199:
1152:September 24, 2021
1065:
899:Menezes–Qu–Vanstone
788:PKCS #12 appendix B
533:Other block ciphers
498:and AES candidates
411:
294:Borland C++ Builder
21:
1197:
1128:December 20, 2020
1112:February 11, 2019
1104:December 28, 2018
1088:February 22, 2018
1063:
1008:security libraries
765:(128/160/256/320)
584:(64/128), SIMECK,
409:
19:
1806:. Sourceforge.net
1246:
1245:
1180:
1179:
1080:January 22, 2018
973:
972:
469:HC-128 and HC-256
449:RDRAND and RDSEED
290:Borland Turbo C++
244:(macOS and iOS),
186:
185:
2046:
1984:
1983:
1981:Official website
1967:
1966:
1964:
1963:
1957:Crypto++ Website
1949:
1943:
1942:
1940:
1939:
1924:
1918:
1917:
1915:
1914:
1899:
1893:
1892:
1890:
1889:
1874:
1868:
1867:
1865:
1864:
1854:
1846:
1840:
1839:
1837:
1836:
1821:
1815:
1814:
1812:
1811:
1800:
1794:
1793:
1791:
1790:
1775:
1769:
1768:
1766:
1765:
1750:
1744:
1743:
1741:
1740:
1733:Crypto++ Website
1725:
1719:
1718:
1716:
1715:
1700:
1694:
1693:
1691:
1690:
1685:. Tom's Hardware
1678:
1672:
1671:
1669:
1668:
1661:Crypto++ Website
1653:
1647:
1646:
1644:
1643:
1628:
1622:
1621:
1619:
1618:
1612:
1605:
1594:
1588:
1587:
1585:
1584:
1578:Crypto++ Website
1570:
1564:
1563:
1561:
1560:
1548:
1546:10.17487/RFC5639
1530:
1524:
1523:
1521:
1520:
1510:
1501:
1495:
1494:
1492:
1491:
1477:
1471:
1470:
1468:
1466:
1455:
1449:
1446:
1444:
1443:
1434:. Archived from
1422:
1420:
1419:
1413:
1401:
1399:
1398:
1392:
1386:. Archived from
1385:
1375:
1373:
1372:
1366:
1360:. Archived from
1355:
1340:
1320:Symmetric cipher
1315:Computer science
1309:
1304:
1303:
1302:
1288:
1286:Crypto++ Website
1200:
1186:FIPS validations
1176:October 1, 2023
1136:January 2, 2021
1066:
1055:Version releases
907:Fully Hashed MQV
824:
662:ChaCha20Poly1305
600:(256/512/1024),
568:(2- and 3-key),
445:Mersenne Twister
412:
203:) is a free and
182:
179:
177:
161:Crypto++ License
145:Security library
128:Operating system
109:
104:
101:
99:
97:
76:
74:
69:
29:
22:
18:
2054:
2053:
2049:
2048:
2047:
2045:
2044:
2043:
2004:
2003:
1979:
1978:
1975:
1970:
1961:
1959:
1951:
1950:
1946:
1937:
1935:
1926:
1925:
1921:
1912:
1910:
1901:
1900:
1896:
1887:
1885:
1876:
1875:
1871:
1862:
1860:
1852:
1848:
1847:
1843:
1834:
1832:
1824:L. Teo (2002).
1822:
1818:
1809:
1807:
1802:
1801:
1797:
1788:
1786:
1776:
1772:
1763:
1761:
1751:
1747:
1738:
1736:
1727:
1726:
1722:
1713:
1711:
1701:
1697:
1688:
1686:
1679:
1675:
1666:
1664:
1655:
1654:
1650:
1641:
1639:
1629:
1625:
1616:
1614:
1610:
1603:
1595:
1591:
1582:
1580:
1572:
1571:
1567:
1558:
1556:
1531:
1527:
1518:
1516:
1508:
1502:
1498:
1489:
1487:
1479:
1478:
1474:
1464:
1462:
1457:
1456:
1452:
1441:
1439:
1417:
1415:
1411:
1396:
1394:
1390:
1383:
1370:
1368:
1364:
1353:
1341:
1337:
1333:
1305:
1300:
1298:
1295:
1289:
1284:
1258:
1239:Certificate 819
1228:Certificate 562
1217:Certificate 343
1188:
1173:Crypto++ 8.9.0
1165:Crypto++ 8.8.0
1160:August 7, 2022
1157:Crypto++ 8.7.0
1149:Crypto++ 8.6.0
1141:Crypto++ 8.5.0
1133:Crypto++ 8.4.0
1125:Crypto++ 8.3.0
1120:April 28, 2019
1117:Crypto++ 8.2.0
1109:Crypto++ 8.1.0
1101:Crypto++ 8.0.0
1093:Crypto++ 7.0.0
1085:Crypto++ 6.1.0
1077:Crypto++ 6.0.0
1057:
986:
818:
337:
302:CodeWarrior Pro
191:(also known as
174:
112:
94:
77:
72:
70:
67:
48:Initial release
17:
12:
11:
5:
2052:
2042:
2041:
2036:
2031:
2026:
2021:
2016:
2002:
2001:
1996:
1990:
1985:
1974:
1973:External links
1971:
1969:
1968:
1944:
1919:
1894:
1869:
1841:
1816:
1795:
1770:
1745:
1720:
1695:
1673:
1648:
1623:
1589:
1565:
1525:
1496:
1472:
1450:
1448:
1447:
1423:
1402:
1376:
1334:
1332:
1329:
1328:
1327:
1322:
1317:
1311:
1310:
1294:
1291:
1282:
1257:
1254:
1244:
1243:
1240:
1237:
1236:Crypto++ 5.3.0
1233:
1232:
1229:
1226:
1225:Crypto++ 5.2.3
1222:
1221:
1218:
1215:
1214:Crypto++ 5.0.4
1211:
1210:
1207:
1204:
1187:
1184:
1178:
1177:
1174:
1170:
1169:
1168:June 25, 2023
1166:
1162:
1161:
1158:
1154:
1153:
1150:
1146:
1145:
1144:March 7, 2021
1142:
1138:
1137:
1134:
1130:
1129:
1126:
1122:
1121:
1118:
1114:
1113:
1110:
1106:
1105:
1102:
1098:
1097:
1096:April 8, 2018
1094:
1090:
1089:
1086:
1082:
1081:
1078:
1074:
1073:
1072:Released Date
1070:
1056:
1053:
1019:cryptest.exe b
985:
982:
971:
970:
960:
958:Secret sharing
954:
953:
928:
922:
921:
895:Diffie–Hellman
892:
886:
885:
860:
854:
853:
827:Rabin-Williams
816:Nyberg-Rueppel
801:
795:
794:
773:
767:
766:
728:
722:
721:
696:
690:
689:
688:, W3C Padding
671:
665:
664:
647:
641:
640:
611:
605:
604:
535:
529:
528:
499:
492:
491:
458:
452:
451:
437:Blum Blum Shub
426:
420:
419:
416:
404:Internet Draft
336:
333:
184:
183:
172:
168:
167:
154:
148:
147:
142:
136:
135:
133:Cross-platform
130:
124:
123:
118:
114:
113:
111:
110:
91:
89:
83:
82:
79:
78:
65:
63:
61:Stable release
57:
56:
53:
52:
49:
45:
44:
37:
31:
30:
15:
9:
6:
4:
3:
2:
2051:
2040:
2039:1995 software
2037:
2035:
2032:
2030:
2027:
2025:
2022:
2020:
2019:C++ libraries
2017:
2015:
2012:
2011:
2009:
2000:
1997:
1994:
1991:
1989:
1986:
1982:
1977:
1976:
1958:
1954:
1948:
1933:
1929:
1923:
1908:
1904:
1898:
1883:
1879:
1873:
1858:
1851:
1845:
1831:
1827:
1820:
1805:
1799:
1785:
1781:
1774:
1760:
1756:
1749:
1734:
1730:
1724:
1710:
1706:
1699:
1684:
1677:
1662:
1658:
1652:
1638:
1634:
1627:
1613:on 2012-02-27
1609:
1602:
1601:
1593:
1579:
1575:
1569:
1555:
1552:
1547:
1542:
1538:
1537:
1529:
1514:
1507:
1500:
1486:
1482:
1476:
1460:
1454:
1438:on 2011-07-21
1437:
1433:
1429:
1424:
1410:
1409:
1403:
1393:on 2011-07-21
1389:
1382:
1377:
1367:on 2014-12-30
1363:
1359:
1352:
1348:
1343:
1342:
1339:
1335:
1326:
1323:
1321:
1318:
1316:
1313:
1312:
1308:
1297:
1287:
1281:
1279:
1275:
1269:
1267:
1263:
1262:public domain
1253:
1251:
1241:
1238:
1235:
1234:
1230:
1227:
1224:
1223:
1219:
1212:
1208:
1205:
1202:
1201:
1195:
1193:
1183:
1172:
1171:
1164:
1163:
1156:
1155:
1148:
1147:
1140:
1139:
1132:
1131:
1124:
1123:
1116:
1115:
1108:
1107:
1100:
1099:
1092:
1091:
1084:
1083:
1076:
1075:
1071:
1068:
1067:
1061:
1052:
1050:
1046:
1042:
1038:
1034:
1033:architectures
1031:
1026:
1024:
1020:
1015:
1013:
1012:block ciphers
1009:
1006:
1001:
999:
995:
991:
981:
977:
968:
964:
961:
959:
956:
955:
952:
948:
944:
940:
936:
932:
929:
927:
924:
923:
920:
916:
912:
908:
904:
900:
896:
893:
891:
888:
887:
884:
880:
877:
873:
869:
865:
862:PKCS#1 v2.0,
861:
859:
856:
855:
852:
848:
844:
841:(variants of
840:
836:
832:
828:
822:
817:
813:
809:
805:
802:
800:
797:
796:
793:
789:
786:, PBKDF from
785:
781:
777:
774:
772:
769:
768:
764:
760:
756:
752:
751:LSH (256/512)
748:
744:
740:
736:
732:
729:
727:
724:
723:
720:
719:Two-Track-MAC
716:
712:
708:
704:
700:
697:
695:
692:
691:
687:
686:One and zeros
683:
679:
675:
672:
670:
667:
666:
663:
659:
655:
651:
648:
646:
643:
642:
639:
635:
631:
627:
623:
619:
615:
612:
610:
607:
606:
603:
599:
595:
591:
587:
583:
579:
575:
571:
567:
563:
559:
555:
551:
547:
543:
539:
536:
534:
531:
530:
527:
523:
519:
515:
511:
507:
506:AES selection
503:
500:
497:
494:
493:
490:
486:
482:
478:
474:
470:
466:
462:
461:ChaCha8/12/20
459:
457:
454:
453:
450:
446:
442:
438:
434:
430:
427:
425:
422:
421:
417:
414:
413:
407:
405:
401:
397:
393:
388:
386:
382:
381:hash function
378:
374:
370:
366:
362:
358:
354:
350:
346:
342:
332:
330:
329:RSA algorithm
326:
321:
319:
315:
311:
307:
303:
299:
295:
291:
287:
283:
279:
275:
274:Windows Phone
271:
267:
263:
259:
255:
251:
247:
243:
239:
235:
234:architectures
232:
228:
224:
220:
217:
216:cryptographic
213:
209:
206:
202:
198:
194:
190:
181:
173:
169:
166:
165:public domain
162:
158:
155:
153:
149:
146:
143:
141:
137:
134:
131:
129:
125:
122:
119:
115:
108:
103:
93:
92:
90:
88:
84:
80:
64:
62:
58:
54:
50:
46:
42:
38:
36:
32:
28:
23:
1960:. Retrieved
1956:
1947:
1936:. Retrieved
1931:
1922:
1911:. Retrieved
1906:
1897:
1886:. Retrieved
1881:
1872:
1861:. Retrieved
1856:
1844:
1833:. Retrieved
1829:
1819:
1808:. Retrieved
1798:
1787:. Retrieved
1783:
1773:
1762:. Retrieved
1758:
1748:
1737:. Retrieved
1732:
1723:
1712:. Retrieved
1708:
1698:
1687:. Retrieved
1676:
1665:. Retrieved
1660:
1651:
1640:. Retrieved
1636:
1626:
1615:. Retrieved
1608:the original
1599:
1592:
1581:. Retrieved
1577:
1568:
1557:. Retrieved
1535:
1528:
1517:. Retrieved
1512:
1499:
1488:. Retrieved
1484:
1475:
1465:December 20,
1463:. Retrieved
1453:
1440:. Retrieved
1436:the original
1431:
1416:. Retrieved
1407:
1395:. Retrieved
1388:the original
1369:. Retrieved
1362:the original
1357:
1338:
1271:
1259:
1247:
1189:
1181:
1058:
1027:
1022:
1018:
1016:
1002:
987:
978:
974:
389:
357:block cipher
338:
322:
288:, including
200:
196:
192:
188:
187:
159:(previously
35:Developer(s)
1485:physorg.com
1347:B. Schneier
1345:J. Kelsey;
1274:compilation
1206:Certificate
1005:open-source
984:Performance
819: [
205:open-source
201:libcryptopp
197:libcrypto++
39:originally
2008:Categories
1962:2010-08-15
1938:2010-08-08
1913:2010-08-08
1888:2010-08-08
1863:2010-08-08
1835:2010-08-09
1810:2010-08-14
1789:2010-08-09
1764:2010-08-09
1739:2010-08-10
1714:2010-08-11
1689:2010-08-10
1667:2010-08-10
1642:2010-08-10
1617:2010-08-12
1583:2022-05-23
1559:2022-05-23
1519:2022-05-23
1490:2022-05-23
1442:2010-08-10
1418:2010-08-10
1397:2010-08-10
1371:2010-08-10
1331:References
994:public key
988:In a 2007
903:Hashed MQV
876:IEEE P1363
851:curve25519
580:(64/128),
566:Triple-DES
441:ANSI X9.17
379:-approved
355:-approved
335:Algorithms
318:Sun Studio
278:Windows RT
219:algorithms
117:Written in
87:Repository
73:2023-10-01
1256:Licensing
998:libraries
909:(FHMQV),
759:WHIRLPOOL
598:Threefish
552:, HIGHT,
485:SOSEMANUK
365:Whirlpool
282:compilers
178:.cryptopp
102:/cryptopp
100:/weidai11
1539:. IETF.
1293:See also
1283:—
1010:with 15
905:(HMQV),
586:Skipjack
574:SHACAL-2
546:Camellia
542:Blowfish
526:CAST-256
502:Rijndael
489:XSalsa20
341:Camellia
193:CryptoPP
189:Crypto++
20:Crypto++
1278:Wei Dai
1203:Version
1069:Version
951:Ed25519
901:(MQV),
812:ElGamal
784:PKCS #5
711:CBC-MAC
522:Serpent
518:Twofish
481:Salsa20
270:Windows
266:Solaris
238:STLport
223:Wei Dai
212:library
171:Website
152:License
71: (
41:Wei Dai
1934:. 2007
1909:. 2005
1884:. 2003
1859:. 2007
1735:. 2009
1663:. 2009
1209:Dates
1041:AES-NI
1039:using
990:ECRYPT
969:(IDA)
919:x25519
915:XTR-DH
911:LUCDIF
835:LUCELG
829:(RW),
825:(NR),
780:PBKDF2
776:PBKDF1
763:RIPEMD
735:Keccak
731:BLAKE2
678:PKCS#7
674:PKCS#5
477:Rabbit
473:Panama
373:NESSIE
367:is an
363:, and
349:NESSIE
343:is an
316:, and
252:, IBM
250:Cygwin
231:64-bit
227:32-bit
210:class
199:, and
96:github
1853:(PDF)
1611:(PDF)
1604:(PDF)
1509:(PDF)
1412:(PDF)
1391:(PDF)
1384:(PDF)
1365:(PDF)
1354:(PDF)
947:ECMQV
939:ECIES
931:ECDSA
883:EMSA5
879:EMSA2
847:ESIGN
843:DHAES
839:DLIES
823:]
782:from
755:Tiger
743:SHA-2
739:SHA-1
682:Zeros
582:Speck
578:Simon
298:Clang
262:MinGW
258:Linux
242:Apple
1554:5639
1467:2020
943:ECDH
935:ECNR
881:and
872:PSSR
864:OAEP
778:and
747:SHA3
715:DMAC
707:CMAC
703:HMAC
699:VMAC
602:XTEA
570:SEED
554:IDEA
550:CHAM
538:ARIA
514:MARS
433:KDF2
392:VMAC
377:IETF
353:IETF
286:IDEs
284:and
276:and
229:and
180:.com
140:Type
98:.com
51:2015
1551:RFC
1541:doi
1049:GCM
1045:AES
1037:AES
1030:x86
868:PSS
845:),
831:LUC
808:DSA
804:RSA
658:EAX
654:GCM
650:CCM
638:XTS
634:CTR
630:OFB
626:CFB
622:CTS
618:CBC
614:ECB
594:TEA
590:SM4
562:RC5
558:LEA
510:RC6
508:),
496:AES
429:LCG
385:SHA
369:ISO
361:AES
345:ISO
306:GCC
254:AIX
246:BSD
240:),
214:of
208:C++
176:www
121:C++
2010::
1955:.
1930:.
1905:.
1880:.
1855:.
1828:.
1782:.
1757:.
1731:.
1707:.
1659:.
1635:.
1576:.
1549:.
1511:.
1483:.
1430:.
1356:.
1025:.
965:,
949:,
945:,
941:,
937:,
933:,
917:,
913:,
874:,
870:,
866:,
849:,
837:,
833:,
821:ru
814:,
810:,
806:,
790:,
761:,
757:,
753:,
749:,
741:,
737:,
717:,
713:,
709:,
705:,
701:,
684:,
680:,
676:,
660:,
656:,
652:,
636:,
632:,
628:,
624:,
620:,
616:,
596:,
592:,
588:,
576:,
572:,
564:,
560:,
548:,
544:,
540:,
524:,
520:,
516:,
512:,
487:,
483:,
479:,
475:,
471:,
467:,
463:,
447:,
443:,
439:,
435:,
431:,
320:.
312:,
304:,
300:,
296:,
292:,
272:,
268:,
264:,
260:,
256:,
248:,
195:,
1965:.
1941:.
1916:.
1891:.
1866:.
1838:.
1813:.
1792:.
1767:.
1742:.
1717:.
1692:.
1670:.
1645:.
1620:.
1586:.
1562:.
1543::
1522:.
1493:.
1469:.
1445:.
1421:.
1400:.
1374:.
1047:-
504:(
375:/
371:/
351:/
347:/
75:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.