angt / aegis256
AEGIS-256
☆9Updated 3 years ago
Alternatives and similar repositories for aegis256:
Users that are interested in aegis256 are comparing it to the libraries listed below
- ☆23Updated 2 months ago
- Sparc emulator☆10Updated 6 years ago
- Tool and library for generating X.509 certificates and certificate requests (mirror)☆16Updated 3 years ago
- A C Templating Engine☆10Updated 8 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆12Updated 3 weeks ago
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆36Updated 7 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆13Updated last year
- Stand alone UNIX implementation of RFC4286 Multicast Router Discovery Protocol☆11Updated 2 years ago
- Header-only portable implementations of common Intel intrisics, including cryptographic instructions.☆13Updated 2 weeks ago
- libslirp for Linux made easy peasy☆28Updated 6 months ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated last year
- A simple Hello World for x86_64 UEFI using fasmg☆26Updated 8 years ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- Tiny public-domain implementation of BLAKE3☆23Updated 3 years ago
- ipcipher is a specification for encrypting IP{v4,v6} addresses 'in place'.☆19Updated 7 years ago
- Exposes batch message receives (recvmmsg)☆13Updated 7 months ago
- arg(z)☆13Updated 2 years ago
- updated fork of libdnet from https://code.google.com/p/libdnet/☆38Updated 7 years ago
- Manipulate tar file metadata, list tar files or convert tar to cpio. For some projects, this can replace fakeroot and cpio, when creating…☆32Updated 8 months ago
- Minimal PID 1 for initramfs☆16Updated 3 months ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- base64 single header encode/decode☆12Updated 2 years ago
- sign elf binaries with GPG☆18Updated 8 years ago
- Authenticated Blowfish-encrypted pipe☆23Updated 7 years ago
- CRYPTOGAMS distribution repository☆56Updated 5 months ago
- Stolen WiFi Aggregate Tunneling Protocol Dæmon (RAID your internet connections!)☆17Updated 12 years ago
- A tweakable block cipher☆31Updated 11 months ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Updated 11 months ago
- Eltanin system programming library☆17Updated last month
- A fast AES-PRF based secure random-number generator☆20Updated last year