Sc00bz / ConstTimeEncodingLinks
Constant time hex and base64 encode and decode
☆24Updated 11 years ago
Alternatives and similar repositories for ConstTimeEncoding
Users that are interested in ConstTimeEncoding are comparing it to the libraries listed below
Sorting:
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- A fast secure userspace pseudorandom number generator☆83Updated 11 years ago
- AVX2 Chacha implementation☆16Updated 12 years ago
- Undelete open files and loop mounts ("improved" version of fdlink)☆10Updated 14 years ago
- ZeroVM Run-Time environment☆65Updated 10 years ago
- An obsolete project☆83Updated 7 years ago
- Mirror of libslz☆34Updated 6 years ago
- Reference Implementation of Catena, a memory-consuming password scrambler☆32Updated 7 years ago
- Yet another signify tool☆90Updated last year
- Plug-and-play IP rate limiter in C☆26Updated 3 months ago
- A deceptively simple way to add a configuration file to a command-line application.☆17Updated 9 months ago
- "What if I tossed small pox into a room filled with sprinters after filling their water cups with red bull."☆33Updated 10 years ago
- A public domain constant-time implementation of ChaCha20 on 8-bit AVR microcontroller.☆35Updated 7 years ago
- Debian root filesystems for multiple architectures☆14Updated 4 years ago
- Authenticated Blowfish-encrypted pipe☆24Updated 7 years ago
- Generates raw WAV output by hooking malloc() and read().☆193Updated 10 years ago
- ☆20Updated 10 years ago
- Review and verification of Brotli compressed data format specification.☆98Updated last year
- A library for high-performance lightweight threads☆20Updated 14 years ago
- Brainfuck Key Derivation Function☆30Updated 10 years ago
- Reference implementations (software)☆85Updated 9 years ago
- C version of the MetroHash function☆27Updated 10 years ago
- Easy, flexible C unit testing☆11Updated 9 years ago
- Control and diagnostic applications for rump kernels☆35Updated 8 years ago
- picotrace - system call process tracer☆39Updated 5 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆24Updated 4 years ago
- Fun with the TLS handshake☆31Updated 11 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 3 years ago
- Oblivious Memory Access under Fully Homomorphic Encryption☆13Updated 10 years ago