SHA-3 and other Keccak related algorithms in SPARK/Ada.
-
Updated
Oct 19, 2023 - Ada
SHA-3 and other Keccak related algorithms in SPARK/Ada.
Java implementation of Keccak and SHA-3 hash functions.
A binding of the KangarooTwelve hash algorithm for Ruby
Implementation of SHA3-keccak and other supportive work
This article is currently searchable in Engineering Village and published by IOP Science.
Browser-based national hash standard demo — SM3 (China), Streebog (Russia), and Kupyna (Ukraine) alongside SHA-256 and SHA-3. Five-way simultaneous hashing, avalanche analysis, and cryptographic sovereignty context.
Browser-based Ascon demo — NIST Lightweight Cryptography Standard (FIPS SP 800-232, 2025). Ascon-AEAD128 encrypt/decrypt with constant-time tag verification, Ascon-Hash256 with avalanche analysis, side-by-side comparison against AES-GCM and ChaCha20-Poly1305. Designed for IoT and embedded constraints. No backends. No external crypto libraries.
Browser-based AEGIS-256 authenticated encryption demo (draft-irtf-cfrg-aegis-aead-18). AES round function, 6-state sponge update, and tag derivation implemented from scratch and verified against official test vectors.
Add a description, image, and links to the sponge-construction topic page so that developers can more easily learn about it.
To associate your repository with the sponge-construction topic, visit your repo's landing page and select "manage topics."