defuse / yescrypt
Non-C Implementations of the yescrypt KDF.
☆29Updated 6 years ago
Alternatives and similar repositories for yescrypt:
Users that are interested in yescrypt are comparing it to the libraries listed below
- Password Hashing Competition Submissions☆71Updated 10 years ago
- Reference implementations (software)☆85Updated 8 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 6 years ago
- A memory-hard password hashing function.☆68Updated last year
- BLAKE2 AVX2 implementations☆23Updated 5 years ago
- axolotl based on libsodium☆22Updated 8 years ago
- Towards an IETF RFC for XChaCha20-Poly1305☆28Updated 5 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆28Updated 6 months ago
- Password hashing scheme Argon☆18Updated 10 years ago
- i2p c++ implementation☆19Updated 10 years ago
- Haraka is a secure and efficient short-input hash function.☆55Updated 7 years ago
- Mirror of freehaven's anonymous research bibliography☆13Updated 10 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 9 years ago
- Ed25519 vanity public key generator☆50Updated 2 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 6 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- An implementation of Mike Hamburg's Ed448 (Goldilocks) curve - derived from libdecaf. This is a mirror of https://bugs.otr.im/otrv4/libgo…☆18Updated 4 years ago
- Python implementation of FIPS SHA3 and SHAKE☆45Updated 7 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- mirror of djb's "NaCl: Networking and Cryptography library"☆49Updated 13 years ago
- (Oblivious) DoH Server☆27Updated 3 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆76Updated 7 years ago
- Assorted I2P tools and scripts☆15Updated 7 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 9 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Updated 3 years ago