ipcrypt-std / ipcrypt2Links
A tiny, portable implementation of the IPCrypt specification in C.
☆31Updated 2 months ago
Alternatives and similar repositories for ipcrypt2
Users that are interested in ipcrypt2 are comparing it to the libraries listed below
Sorting:
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 5 months ago
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆18Updated 2 weeks ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆38Updated 11 months ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 9 months ago
- ☆25Updated 6 months ago
- FPE - Format Preserving Encryption with FF3 in C☆14Updated 5 months ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 7 years ago
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆109Updated last week
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- A tweakable block cipher☆31Updated last year
- ☆11Updated 2 years ago
- data-at-rest updatable threshold encryption KMS server and client☆21Updated last month
- AEGIS-256☆11Updated 3 years ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆45Updated last year
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- A cache hard password hash/KDF☆48Updated last year
- A Secure and Memory-Efficient Heap Allocator☆34Updated last year
- ADAM is an actively developed CSPRNG inspired by ISAAC64☆21Updated 2 months ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 5 months ago
- A collection of high-performance crypto implementations.☆52Updated 3 weeks ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Updated 3 years ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆15Updated 4 years ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated 2 months ago
- Haraka is a secure and efficient short-input hash function.☆58Updated 8 years ago
- CPUID database derived from InstLatx64☆15Updated 5 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Updated last year
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆20Updated 2 years ago
- A collection of interesting ELF files for inspiration and testing☆30Updated 2 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated last month