Sc00bz / bscrypt
A cache hard password hash/KDF
☆45Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for bscrypt
- A collection of high-performance crypto implementations.☆44Updated 4 months ago
- A tweakable block cipher☆30Updated 6 months ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆34Updated last week
- A Zig implementation of EdDSA signatures with blind keys.☆16Updated last year
- Specification for the AEGIS family of authenticated encryption algorithms.☆11Updated this week
- Bertie TLS 1.3 Implementation☆112Updated this week
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆16Updated 2 months ago
- AES-GEM (AES Galois Extended Mode) implementation.☆12Updated 4 months ago
- Community Cryptography Test Vectors☆64Updated 3 weeks ago
- BAT KEM/Signature Reference Implementation☆19Updated 2 years ago
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆62Updated last week
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated 7 months ago
- A quick benchmark of {Open,Libre,Boring}SSL☆25Updated 2 years ago
- Compress sets of integers efficiently☆19Updated 3 months ago
- Specifications for Privacy Proxy Implementations☆29Updated this week
- WebPKI-level Certificate Revocation via Multi-Level Bloom Filter Cascade☆77Updated 2 weeks ago
- A suite of testvectors for X.509 certificate path validation and tools for building them☆42Updated this week
- Fork of BoringSSL that adds hybrid post-quantum key exchange☆23Updated last month
- Experimental implementation of the Distributed Aggregation Protocol (DAP) specification.☆53Updated this week
- An experimental authenticated cipher.☆10Updated 4 months ago
- 🧹🧹🧹 File expiration for any filesystem☆46Updated last year
- Implementations of do255e and do255s in C and assembly☆25Updated 3 years ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆47Updated 4 months ago
- ☆81Updated 4 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆28Updated 3 months ago
- Verifying constant-time code with symbolic execution☆42Updated 3 years ago
- ☆23Updated last month
- GCC plugin for C language that tracks references to allocated objects☆23Updated last week
- Argon2 key derivation function in zig.☆15Updated 3 years ago