Password Hashing Competition Submissions
☆72Apr 12, 2014Updated 11 years ago
Alternatives and similar repositories for PHC
Users that are interested in PHC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reference Implementation of Catena, a memory-consuming password scrambler☆32Mar 26, 2018Updated 7 years ago
- A curated list of cryptography papers, articles, tutorials and howtos.☆10Feb 19, 2024Updated 2 years ago
- TodoMVC app using Mithril.js with CoffeeScript and Brunch☆17Jul 21, 2022Updated 3 years ago
- TokenTools is the successor project to a C program I wrote called CardRand, allowing Linux to use the random number generator in cryptogr…☆16May 15, 2017Updated 8 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- Elliptic curves Rust reference implementation☆16Mar 10, 2024Updated 2 years ago
- Speck Block Cipher Implementation☆15Nov 20, 2015Updated 10 years ago
- Symmetric ciphers, hashes, microtime, random strings, big integers, and zlib compression☆28Sep 7, 2015Updated 10 years ago
- Memory-hard scheme Argon2☆208Jan 9, 2021Updated 5 years ago
- A demonstration of the absolute minimum needed to get an engine started.☆12Aug 20, 2018Updated 7 years ago
- a web page / paper☆18Feb 24, 2017Updated 9 years ago
- Command-line archiver: DEFLATE, LZMA, LZIP, BZIP2, ZPAQ, LZ4, ZSTD, BROTLI, BSC, CSC, BCM, MCM, ZMOLLY, ZLING, TANGELO, SHRINKER, CRUSH,…☆22Jun 23, 2016Updated 9 years ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆28Jan 1, 2026Updated 2 months ago
- Static site for big five personality tests☆10Mar 13, 2026Updated last week
- Userland SCTP implementation☆28Oct 2, 2014Updated 11 years ago
- ChaCha20 + Poly1305☆27Apr 30, 2016Updated 9 years ago
- Convert Youtube Channel Name To Channel ID☆10Jun 1, 2023Updated 2 years ago
- A Python program to break up a file into multiple QR codes to be scanned by TXQRAndroid☆11May 23, 2019Updated 6 years ago
- Reference implementations (software)☆85Nov 11, 2016Updated 9 years ago
- The JSON5 Data Interchange Format☆54May 15, 2023Updated 2 years ago
- binary-to-text encoding schemes that represent binary data in an unicode string format☆10Jun 29, 2021Updated 4 years ago
- Java implementation of the BLAKE2b cryptographic hash function☆81Nov 21, 2022Updated 3 years ago
- A simple method for abstract hash visualization☆14Jul 28, 2018Updated 7 years ago
- small tornado project of an imageboard with very bad and outdated code. use branch develop☆10Dec 8, 2022Updated 3 years ago
- りん姫(bitzeny投げ銭bot)☆25Jul 11, 2018Updated 7 years ago
- Optimized multi algo CPU miner☆13Mar 14, 2019Updated 7 years ago
- Reference implementations of the GIMLI permutation☆15Jul 9, 2017Updated 8 years ago
- A fast implementation of the ECMA-182 CRC64 checksum using the CLMUL instruction set☆15Nov 1, 2016Updated 9 years ago
- Fork of libsignal-protocol-c adding support for OMEMO XEP-0384 0.5.0+☆13Mar 29, 2025Updated 11 months ago
- A simple paper-based storage format☆16Sep 13, 2022Updated 3 years ago
- VHDL ieee_proposed library, imported as is. See also https://github.com/FPHDL/fphdl☆12Aug 26, 2016Updated 9 years ago
- Argon2 Java implementation☆44Nov 5, 2019Updated 6 years ago
- LogisCoin Core☆11Jan 31, 2019Updated 7 years ago
- Haml for Lua☆53Jun 29, 2012Updated 13 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 10 months ago
- ☆49May 22, 2024Updated last year
- Generate compositions, supercompositions and variants for a given Hanzi / Kanji☆11Dec 22, 2018Updated 7 years ago
- A flexible implementation of Colin Percival's scrypt☆90Aug 10, 2023Updated 2 years ago
- HCTR2 specification and test vectors☆42Feb 17, 2025Updated last year