ipcrypt-std / ipcrypt2Links
A tiny, portable implementation of the IPCrypt specification in C.
☆32Updated this week
Alternatives and similar repositories for ipcrypt2
Users that are interested in ipcrypt2 are comparing it to the libraries listed below
Sorting:
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated this week
- AEGIS-256☆11Updated 3 years ago
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆18Updated 2 weeks ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 6 months ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆38Updated last year
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆111Updated this week
- ☆25Updated 7 months ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- ☆12Updated 2 years ago
- A tweakable block cipher☆31Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- A cache hard password hash/KDF☆48Updated last year
- data-at-rest updatable threshold encryption KMS server and client☆22Updated 2 months ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 7 years ago
- ADAM is an actively developed CSPRNG inspired by ISAAC64☆21Updated 4 months ago
- Methods for IP Address Encryption and Obfuscation.☆28Updated last week
- Compiler from Webassembly to native binaries☆14Updated last month
- A collection of high-performance crypto implementations.☆52Updated last month
- FPE - Format Preserving Encryption with FF3 in C☆15Updated 6 months ago
- The wolfSSL Command Line Utility wolfCLU☆19Updated last month
- A Secure and Memory-Efficient Heap Allocator☆34Updated last year
- GCC plugin for C language that tracks references to allocated objects☆30Updated 7 months ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆46Updated last year
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated 3 months ago
- A minimal, resource-friendly syslog daemon for embedded Linux☆27Updated 2 years ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Updated 3 years ago
- QARMA block cipher in C☆31Updated 3 years ago
- rev.ng configuration for orchestra. The starting point for any development.☆36Updated 2 weeks ago
- xxhash-64 in 20 lines☆25Updated last year
- Parallel LZ4 optimized for speed☆17Updated last month