WOnder93 / argon2Links
A multi-arch library implementing the Argon2 password hashing algorithm.
☆15Updated last year
Alternatives and similar repositories for argon2
Users that are interested in argon2 are comparing it to the libraries listed below
Sorting:
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- A simple, decompressing executable packer☆45Updated 3 years ago
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆36Updated 7 years ago
- Reference Implementation of Catena, a memory-consuming password scrambler☆31Updated 7 years ago
- CRYPTOGAMS distribution repository☆59Updated 2 weeks ago
- Manipulate tar file metadata, list tar files or convert tar to cpio. For some projects, this can replace fakeroot and cpio, when creating…☆32Updated last month
- Optimized block functions for the ChaCha stream cipher☆51Updated 5 years ago
- A tweakable block cipher☆31Updated last year
- Implementations of a fast Message-Authentication Code☆119Updated 2 years ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆101Updated 8 years ago
- Password Hashing Competition Submissions☆72Updated 11 years ago
- A deceptively simple way to add a configuration file to a command-line application.☆17Updated 5 months ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆15Updated 4 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated last month
- tfcrypt -- high security Threefish encryption tool.☆10Updated 2 years ago
- AES-GCM-SIV implementations (128 and 256 bit)☆118Updated 6 years ago
- POSIX-overlay filesystem☆13Updated 7 years ago
- Sample of standalone portable C to verify Ed25519 public-key signature☆20Updated 8 years ago
- A collection of small programs using toxcore.☆15Updated 5 months ago
- A tiny library to properly encrypt IP addresses.☆20Updated 2 months ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- 100% XXTEA authenticated, chunked file encryption☆18Updated 4 years ago
- A public domain constant-time implementation of ChaCha20 on 8-bit AVR microcontroller.☆32Updated 7 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- A really tiny crypto library.☆160Updated 3 months ago
- Jitterentropy RNGd☆98Updated last month
- Optimized implementations of Poly1305, a fast message-authentication-code☆46Updated 10 years ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆27Updated 9 years ago
- A software FIDO2/U2F authenticator☆46Updated last year
- gcc wrapper and libc for creating tiny (200-byte) Linux i386 executables☆15Updated 2 years ago