WOnder93 / argon2Links
A multi-arch library implementing the Argon2 password hashing algorithm.
☆15Updated 2 years ago
Alternatives and similar repositories for argon2
Users that are interested in argon2 are comparing it to the libraries listed below
Sorting:
- A simple, decompressing executable packer☆45Updated 3 years ago
- A tiny, portable implementation of the IPCrypt specification in C.☆22Updated this week
- A collection of small programs using toxcore.☆15Updated 6 months ago
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆36Updated 7 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- C SAMv3 library☆32Updated last month
- Optimized block functions for the ChaCha stream cipher☆51Updated 5 years ago
- A public domain constant-time implementation of ChaCha20 on 8-bit AVR microcontroller.☆32Updated 7 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- CRYPTOGAMS distribution repository☆59Updated last week
- tfcrypt -- high security Threefish encryption tool.☆10Updated 2 years ago
- 100% XXTEA authenticated, chunked file encryption☆18Updated 4 years ago
- Reference Implementation of Catena, a memory-consuming password scrambler☆31Updated 7 years ago
- Sample of standalone portable C to verify Ed25519 public-key signature☆20Updated 8 years ago
- A deceptively simple way to add a configuration file to a command-line application.☆17Updated 6 months ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 2 months ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆37Updated 8 months ago
- A port of the Google Randen fast backtracking-resistant random generator to the C language.☆27Updated 7 years ago
- Manipulate tar file metadata, list tar files or convert tar to cpio. For some projects, this can replace fakeroot and cpio, when creating…☆32Updated 2 months ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆69Updated 4 years ago
- A really tiny crypto library.☆160Updated 4 months ago
- A tweakable block cipher☆31Updated last year
- Pufferfish2 password hashing scheme☆59Updated last year
- some core unix utils with focus on simplicity and ability to build standalone.☆41Updated last year
- Crypto library showing how to use NaCl and libsodium to encrypt and decrypt message securely.☆23Updated 11 years ago
- Linux tools for signed PE-COFF binaries☆121Updated last year
- Cryptographic signing, ported from BSD for Linux, that uses instructions of modern CPUs☆24Updated 4 years ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆101Updated 8 years ago
- A simpler alternative to the Noise protocol framework.☆21Updated 4 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago