Overview

The Avx cryptography suite provides a comprehensive collection of modern cryptographic primitives and security protocols. From basic symmetric encryption to cutting-edge post-quantum algorithms and zero-knowledge proofs, these packages are designed for high-performance, memory-safe implementations in Rust.

High Performance

SIMD-optimized implementations with constant-time operations

🔒

Side-Channel Resistant

Protected against timing attacks and cache-timing vulnerabilities

🛡️

Post-Quantum Ready

NIST-approved algorithms for quantum-resistant security

Core Cryptography

Foundation cryptographic primitives for everyday encryption needs

🔐 avx-crypto

Core

Comprehensive cryptographic library with symmetric/asymmetric encryption, modern ciphers (AES-GCM, ChaCha20-Poly1305), and key exchange protocols (ECDH, X25519). The foundation for all cryptographic operations.

AES-256 ChaCha20 ECDH X25519

🔑 avx-hash

Core

High-performance cryptographic hash functions including SHA-2, SHA-3, BLAKE2, BLAKE3, and specialized hashes. Optimized with SIMD instructions for maximum throughput.

SHA-256/512 SHA-3 BLAKE2/3 SIMD

🛡️ avx-aead

Core

Authenticated Encryption with Associated Data (AEAD) ciphers providing both confidentiality and authenticity. Includes AES-GCM, ChaCha20-Poly1305, and AES-GCM-SIV implementations.

AES-GCM ChaCha20-Poly1305 Authenticated

✅ avx-mac

Core

Message Authentication Codes (MAC) for verifying data integrity and authenticity. Implements HMAC, CMAC, Poly1305, and BLAKE3-MAC with constant-time verification.

HMAC CMAC Poly1305 Constant-time

🔀 avx-kdf

Core

Key Derivation Functions for generating cryptographic keys from passwords and secrets. Includes PBKDF2, Argon2, HKDF, and scrypt with memory-hard algorithms for password hashing.

PBKDF2 Argon2 HKDF scrypt

Advanced Cryptography

Cutting-edge cryptographic protocols for next-generation security

🌌 avx-post-quantum

Post-Quantum NIST

Post-quantum cryptography algorithms resistant to quantum computer attacks. Implements NIST-approved algorithms: CRYSTALS-Kyber, CRYSTALS-Dilithium, SPHINCS+, and Falcon for future-proof security.

Kyber Dilithium SPHINCS+ Quantum-Safe

⚛️ avx-quantum

Experimental

Quantum cryptography protocols including Quantum Key Distribution (QKD), quantum-resistant primitives, and hybrid classical-quantum security schemes for the quantum era.

QKD BB84 Hybrid

🎭 avx-zkp

Zero-Knowledge

Zero-Knowledge Proof systems enabling privacy-preserving authentication and verification. Implements zk-SNARKs, zk-STARKs, Bulletproofs, and Groth16 for blockchain and privacy applications.

zk-SNARKs zk-STARKs Bulletproofs Privacy

🤝 avx-mpc

Multi-Party

Secure Multi-Party Computation protocols for collaborative computation without revealing private inputs. Includes Shamir's Secret Sharing, garbled circuits, and oblivious transfer primitives.

Secret Sharing Garbled Circuits Secure Computation

🔢 avx-threshold

Distributed

Threshold cryptography for distributed key management and signatures. Enables (t,n)-threshold schemes where t parties out of n are required for cryptographic operations.

(t,n)-Threshold TSS Distributed Keys

Security & Privacy Protocols

Identity, access control, and anonymity solutions

✍️ avx-signature

Production

Digital signature algorithms for authentication and non-repudiation. Supports ECDSA, EdDSA (Ed25519, Ed448), RSA-PSS, and BLS signatures with batch verification.

ECDSA Ed25519 BLS Batch Verify

📜 avx-pki

Production

Public Key Infrastructure for certificate management, X.509 certificates, certificate chains, CRL/OCSP verification, and CA operations for enterprise PKI deployments.

X.509 CA OCSP Chain Verify

🗝️ avx-secrets

Production

Secrets management and secure storage for API keys, passwords, tokens, and credentials. Includes encrypted vaults, key rotation, access control, and audit logging.

Vault Key Rotation Access Control Audit

👻 avx-stealth

Privacy

Stealth addresses and privacy-preserving payment protocols. Enables anonymous transactions with one-time addresses, view keys, and spend keys for blockchain privacy.

Stealth Addresses View Keys Privacy

🧅 avx-onion-routing

Anonymity

Onion routing protocol for anonymous communication. Multi-layer encryption, circuit building, relay selection, and Tor-compatible implementations for network anonymity.

Tor Protocol Multi-hop Anonymous

Quick Start Example

Get started with Avx cryptography in minutes:

use avx_crypto::{Cipher, KeyPair};
use avx_hash::Hasher;
use avx_aead::AesGcm;

// Generate a key pair
let keypair = KeyPair::generate()?;

// Hash some data
let hash = Hasher::sha3_256(b"Hello, Avx!");

// Encrypt with AEAD
let cipher = AesGcm::new(&key)?;
let ciphertext = cipher.encrypt(b"secret data", &nonce, &aad)?;

// Verify and decrypt
let plaintext = cipher.decrypt(&ciphertext, &nonce, &aad)?;