epixoip / pufferfishLinks
Pufferfish2 password hashing scheme
☆59Updated last year
Alternatives and similar repositories for pufferfish
Users that are interested in pufferfish are comparing it to the libraries listed below
Sorting:
- some core unix utils with focus on simplicity and ability to build standalone.☆40Updated last year
- A really tiny crypto library.☆160Updated 2 months ago
- A tweakable block cipher☆31Updated last year
- ☆23Updated last month
- A port of the Google Randen fast backtracking-resistant random generator to the C language.☆27Updated 7 years ago
- Sample of standalone portable C to verify Ed25519 public-key signature☆20Updated 8 years ago
- picotrace - system call process tracer☆39Updated 5 years ago
- Non-C Implementations of the yescrypt KDF.☆29Updated 6 years ago
- PGP key poisoner☆36Updated 5 years ago
- Cryptography library. X25519, Ed25519, qDSA, Elligator2, Ristretto, ChaCha20, Blake2, Poly1305, Scrypt, Noise protocol, File encryption i…☆34Updated 5 years ago
- Optimized block functions for the ChaCha stream cipher☆51Updated 5 years ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆36Updated 6 months ago
- A fast secure userspace pseudorandom number generator☆83Updated 11 years ago
- Painless Linux sandboxing API☆16Updated last year
- A fast AES-PRF based secure random-number generator☆20Updated last year
- A repository to store code implementing common features, algorithms, and datastructures that are generally useful to terra code☆22Updated 3 years ago
- tux3 file system☆75Updated 10 years ago
- SHA-3 finalist (reference code)☆39Updated 11 years ago
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆91Updated last month
- A new city of code on a cosmopolitan foundation.☆20Updated 4 years ago
- Haraka is a secure and efficient short-input hash function.☆57Updated 7 years ago
- C++ SAMv3 library☆37Updated 2 months ago
- Pong revolution.☆13Updated 5 years ago
- Cuckoo Hashtable C Library☆33Updated 5 years ago
- Lightweight cryptographic hash functions (reference code)☆16Updated 11 years ago
- Tiny public-domain implementation of BLAKE3☆24Updated 3 years ago
- a "small is beautiful" tool for UNIX privilege escalation☆58Updated 4 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- A cache hard password hash/KDF☆47Updated last year
- Plug-and-play IP rate limiter in C☆24Updated 4 years ago