Sc00bz / bscryptLinks
A cache hard password hash/KDF
☆47Updated last year
Alternatives and similar repositories for bscrypt
Users that are interested in bscrypt are comparing it to the libraries listed below
Sorting:
- Compress sets of integers efficiently☆22Updated 2 months ago
- A collection of high-performance crypto implementations.☆52Updated 2 months ago
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆91Updated last month
- A tweakable block cipher☆31Updated last year
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆36Updated 6 months ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 4 months ago
- Bertie TLS 1.3 Implementation☆118Updated last month
- Argon2 key derivation function in zig.☆15Updated 3 years ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated last year
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- DNS proxy for enabling any application to use DNS Over HTTPS/DNS Over TLS/DNSCrypt☆23Updated 3 years ago
- Community Cryptography Test Vectors☆78Updated 2 months ago
- A suite of testvectors for X.509 certificate path validation and tools for building them☆53Updated this week
- ☆26Updated this week
- A quick benchmark of {Open,Libre,Boring}SSL☆25Updated 2 years ago
- Oblivious HTTP implementation☆31Updated last year
- A tiny library to properly encrypt IP addresses.☆18Updated 3 weeks ago
- Specifications for Privacy Proxy Implementations☆31Updated last week
- simple Rust CLI tool to derive an age private key from passphrase☆38Updated last year
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆13Updated 3 months ago
- WebPKI-level Certificate Revocation via Multi-Level Bloom Filter Cascade☆97Updated 3 weeks ago
- Specification for the AEGIS family of authenticated encryption algorithms.☆17Updated 2 months ago
- Libraries and binaries for running witnesses for verifiable logs☆26Updated this week
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated last week
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated 3 weeks ago
- Deterministic key generation for Go.☆18Updated 2 weeks ago
- Pong revolution.☆13Updated 5 years ago
- Go library for deriving age X25519 identities deterministically from keys or passwords.☆33Updated 5 months ago
- A collection of open source tlog tooling.☆16Updated 2 weeks ago