A memory-hard password hashing function.
☆71May 29, 2023Updated 2 years ago
Alternatives and similar repositories for balloon
Users that are interested in balloon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Balloon Hashing implemented in Python☆17Nov 21, 2025Updated 4 months ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- ☆12Jun 25, 2021Updated 4 years ago
- BLS working standard draft☆39Aug 8, 2019Updated 6 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆31Aug 5, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- LaTeX of the MimbleWimble paper☆32Dec 23, 2021Updated 4 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- A consensus-compatible Zcash node client written in Rust. 🦓☆80Jun 6, 2022Updated 3 years ago
- Public working documents (e.g., Internet drafts)☆26Jun 8, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆12May 7, 2021Updated 4 years ago
- dalek-compatible implementation of the merlin transcript protocol☆28Feb 11, 2020Updated 6 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆15Jan 15, 2021Updated 5 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- Auditing Applied Cryptography☆11Sep 26, 2019Updated 6 years ago
- Implements ristretto255, a fast prime-order group.☆110Feb 19, 2026Updated last month
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- Easy botan integration into cmake projects using automatically generated amalgamation files.☆18Oct 7, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- tfcrypt -- high security Threefish encryption tool.☆10Aug 9, 2023Updated 2 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Oct 26, 2023Updated 2 years ago
- This is a port of the Vyper Eth 2.0 deposit contract to Solidity.☆20Aug 26, 2020Updated 5 years ago
- Bounds on divsteps iterations in safegcd☆57Sep 30, 2024Updated last year
- DES cracking using brute force algorithm and CUDA☆25Jun 14, 2017Updated 8 years ago
- An implementation of a post quantum anonymous credential scheme☆16Dec 18, 2024Updated last year
- Zcash "Sapling" cryptography☆87Mar 3, 2026Updated 3 weeks ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆47Feb 6, 2015Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 3 years ago
- Code for zero-knowledge middleboxes☆63Jul 26, 2022Updated 3 years ago
- BLST-Verification☆23Jan 22, 2026Updated 2 months ago
- Go implementation of bcrypt_pbkdf(3) from OpenBSD☆15Feb 5, 2015Updated 11 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆44Mar 13, 2020Updated 6 years ago
- Sparse MerkleTree implementation in Rust☆19Oct 16, 2019Updated 6 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Nov 10, 2023Updated 2 years ago