Sc00bz / bscryptLinks
A cache hard password hash/KDF
☆47Updated last year
Alternatives and similar repositories for bscrypt
Users that are interested in bscrypt are comparing it to the libraries listed below
Sorting:
- Compress sets of integers efficiently☆22Updated 4 months ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 5 months ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- Bertie TLS 1.3 Implementation☆124Updated 2 months ago
- A tweakable block cipher☆31Updated last year
- A collection of high-performance crypto implementations.☆53Updated 3 months ago
- Community Cryptography Test Vectors☆82Updated 3 months ago
- A suite of testvectors for X.509 certificate path validation and tools for building them☆54Updated last week
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆93Updated last month
- DNS proxy for enabling any application to use DNS Over HTTPS/DNS Over TLS/DNSCrypt☆23Updated 4 years ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆37Updated 8 months ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated last month
- A distributed hash table with unusually strong security properties☆64Updated 5 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆17Updated 4 months ago
- WebPKI-level Certificate Revocation via Multi-Level Bloom Filter Cascade☆116Updated 3 weeks ago
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆18Updated last month
- A tiny library to properly encrypt IP addresses.☆20Updated 2 months ago
- Oblivious HTTP implementation☆31Updated last year
- A port of the Google Randen fast backtracking-resistant random generator to the C language.☆27Updated 7 years ago
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- Specification for the AEGIS family of authenticated encryption algorithms.☆18Updated last week
- ☆24Updated 3 months ago
- Idol, an IDL and binary encoding for zero-copy local IPC☆50Updated 10 months ago
- Pong revolution.☆13Updated 5 years ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- A Certificate Transparency log implementation and monitoring API designed for scalability, ease of operation, and reduced cost.☆252Updated this week
- Specifications for Privacy Proxy Implementations☆31Updated 3 weeks ago
- simple Rust CLI tool to derive an age private key from passphrase☆39Updated last year
- A simpler alternative to the Noise protocol framework.☆21Updated 4 years ago
- ☆26Updated last week