Golang (X)ChaCha20 stream cipher. (Mirror)
☆60May 2, 2023Updated 2 years ago
Alternatives and similar repositories for chacha20
Users that are interested in chacha20 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Apr 14, 2025Updated 11 months ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated last year
- The crypto repository contains some additional cryptographic packages for Go☆28Jul 7, 2016Updated 9 years ago
- Guidelines, procedures, and templates used by the IETF Moderators team.☆24Feb 17, 2026Updated last month
- ☆21Dec 16, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆18Oct 30, 2023Updated 2 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Oct 19, 2022Updated 3 years ago
- CBOR Information Resources☆13Feb 16, 2026Updated last month
- Official SQISignHD code, version under continuous development.☆12Jul 18, 2025Updated 8 months ago
- ChaCha20Poly1305 and XChaCha20Poly1305 AEAD implementations☆19Nov 24, 2020Updated 5 years ago
- Implementations of do255e and do255s in C and assembly☆25May 3, 2021Updated 4 years ago
- Java implementation of FIPS 202, SHA3-xxxx, SHAKE128, SHAKE256☆20Oct 13, 2020Updated 5 years ago
- A blake2s java implementation☆19Jan 31, 2016Updated 10 years ago
- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness☆11Nov 2, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆11Mar 19, 2023Updated 3 years ago
- Post-quantum Wireguard (Theory)☆13Sep 9, 2020Updated 5 years ago
- Easy to use, modern symmetric encryption on the command line☆10May 26, 2016Updated 9 years ago
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 3 years ago
- A pure Go implementation of the ChaCha20 stream cipher.☆45Nov 7, 2015Updated 10 years ago
- Chacha20 in Javascript☆24Apr 15, 2021Updated 4 years ago
- A pure Java implementation of BLAKE2 (RFC 7693)☆12Sep 12, 2023Updated 2 years ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆27Apr 13, 2015Updated 10 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Jul 29, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ChaCha20 and XChaCha20 stream ciphers☆73Jul 9, 2018Updated 7 years ago
- The secure messaging summit information☆20Oct 27, 2020Updated 5 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 9 months ago
- A cryptographically secure pseudorandom number generator cli tool printing in a wide variety of byte encodings (hex, base64,..) and for m…☆14Sep 25, 2023Updated 2 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆21Dec 20, 2020Updated 5 years ago
- FIPS-204 (ML-DSA) implementation in Go☆19Feb 13, 2026Updated last month
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- A BibTeX collection on Isogeny-based Cryptography☆18Jan 20, 2023Updated 3 years ago
- libsodium-jna is a java library that binds to libsodium C crypto APIs with Java Native Access (JNA)☆55Feb 5, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 11 months ago
- ☆13Mar 12, 2026Updated 2 weeks ago
- ☆38Dec 16, 2021Updated 4 years ago
- high performance float32 matrix and vector math library using SIMD for graphics software☆23Feb 3, 2016Updated 10 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆28Jan 1, 2026Updated 2 months ago
- Elliptic curves Rust reference implementation☆16Mar 10, 2024Updated 2 years ago