google / aegis_cipherLinks
☆23Updated 3 weeks ago
Alternatives and similar repositories for aegis_cipher
Users that are interested in aegis_cipher are comparing it to the libraries listed below
Sorting:
- A standalone AES-KW (AES Key Wrap) implementation.☆14Updated last year
- Argon2 key derivation function in zig.☆15Updated 3 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 10 months ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated last month
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆35Updated 5 months ago
- tux3 file system☆75Updated 10 years ago
- An implementation of the OPAQUE password-authenticated key exchange protocol☆10Updated last month
- ☆19Updated 4 years ago
- Pong revolution.☆13Updated 5 years ago
- A DNS library for Rust.☆23Updated 2 months ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- A tweakable block cipher☆31Updated last year
- Header-only portable implementations of common Intel intrisics, including cryptographic instructions.☆13Updated 3 weeks ago
- HPKE implementation for Zig.☆17Updated 3 months ago
- Specification for the AEGIS family of authenticated encryption algorithms.☆17Updated last month
- An AES-based 384 bit permutation.☆20Updated last month
- An ENGINE gluing together OpenSSL and NaCl-derived crypto.☆18Updated 2 years ago
- Towards an IETF RFC for XChaCha20-Poly1305☆28Updated 5 years ago
- A quick benchmark of {Open,Libre,Boring}SSL☆25Updated 2 years ago
- Compress sets of integers efficiently☆21Updated last month
- Tools for testing C compilers for the correct handling of volatile objects.☆26Updated 10 years ago
- sign elf binaries with GPG☆18Updated 8 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- Specifications for Privacy Proxy Implementations☆31Updated last week
- Oblivious DoH library☆17Updated 3 years ago
- Elliptic curves Rust reference implementation☆16Updated last year
- A golang implementation of Ed448-Goldilocks. This is a mirror of https://bugs.otr.im/otrv4/ed448☆40Updated 2 years ago
- A tiny library to properly encrypt IP addresses.☆17Updated 2 weeks ago
- A deceptively simple way to add a configuration file to a command-line application.☆16Updated 2 months ago