WOnder93 / argon2Links
A multi-arch library implementing the Argon2 password hashing algorithm.
☆15Updated 2 years ago
Alternatives and similar repositories for argon2
Users that are interested in argon2 are comparing it to the libraries listed below
Sorting:
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆36Updated 7 years ago
- A simple, decompressing executable packer☆45Updated 3 years ago
- CRYPTOGAMS distribution repository☆62Updated last month
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- A collection of small programs using toxcore.☆15Updated 7 months ago
- A tiny, portable implementation of the IPCrypt specification in C.☆26Updated 3 weeks ago
- Implementations of a fast Message-Authentication Code☆120Updated 3 years ago
- Reference Implementation of Catena, a memory-consuming password scrambler☆31Updated 7 years ago
- Optimized block functions for the ChaCha stream cipher☆52Updated 5 years ago
- ☆12Updated last year
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆70Updated 4 years ago
- Undelete open files and loop mounts ("improved" version of fdlink)☆10Updated 14 years ago
- 100% XXTEA authenticated, chunked file encryption☆18Updated 4 years ago
- A tweakable block cipher☆31Updated last year
- A simple Hello World for x86_64 UEFI using fasmg☆26Updated 9 years ago
- Asynchronous and more versatile replacement of posix_spawn☆23Updated 4 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- Manipulate tar file metadata, list tar files or convert tar to cpio. For some projects, this can replace fakeroot and cpio, when creating…☆32Updated 4 months ago
- A port of the Google Randen fast backtracking-resistant random generator to the C language.☆27Updated 7 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 3 months ago
- Authenticated Blowfish-encrypted pipe☆23Updated 7 years ago
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆18Updated 2 weeks ago
- A public domain constant-time implementation of ChaCha20 on 8-bit AVR microcontroller.☆34Updated 7 years ago
- C SAMv3 library☆32Updated 3 months ago
- tfcrypt -- high security Threefish encryption tool.☆10Updated 2 years ago
- Jitterentropy RNGd☆100Updated 3 months ago
- A deceptively simple way to add a configuration file to a command-line application.☆17Updated 7 months ago
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago
- A cleanroom implementation of TLS 1.3☆28Updated 6 years ago