ipcrypt-std / ipcrypt2Links
A tiny, portable implementation of the IPCrypt specification in C.
☆30Updated last month
Alternatives and similar repositories for ipcrypt2
Users that are interested in ipcrypt2 are comparing it to the libraries listed below
Sorting:
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 4 months ago
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆18Updated 3 weeks ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆37Updated 10 months ago
- FPE - Format Preserving Encryption with FF3 in C☆14Updated 4 months ago
- A cache hard password hash/KDF☆48Updated last year
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- ADAM is an actively developed CSPRNG inspired by ISAAC64☆21Updated 2 months ago
- ☆11Updated 2 years ago
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆105Updated this week
- A tweakable block cipher☆31Updated last year
- data-at-rest updatable threshold encryption KMS server and client☆21Updated last week
- ☆25Updated 5 months ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆18Updated 7 months ago
- A collection of high-performance crypto implementations.☆52Updated last week
- post-quantum safe encryption plugin for age encryption☆23Updated 3 years ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆45Updated 11 months ago
- A Secure and Memory-Efficient Heap Allocator☆34Updated last year
- A quick benchmark of {Open,Libre,Boring}SSL☆27Updated 3 years ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 7 years ago
- AEGIS-256☆10Updated 3 years ago
- The smallest readable implementation of AES algorithms in C☆58Updated last month
- A minimal, resource-friendly syslog daemon for embedded Linux☆26Updated 2 years ago
- Minimal setup to trigger the xz backdoor☆28Updated last year
- BAT KEM/Signature Reference Implementation☆23Updated 3 years ago
- QARMA block cipher in C☆31Updated 3 years ago
- The wolfSSL Command Line Utility wolfCLU☆19Updated 2 months ago
- A super simple /sbin/init for Linux which allows running one and only one program☆29Updated last year
- A simple, decompressing executable packer☆45Updated 3 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated last week
- An idiomatic C++ wrapper for the Monocypher crypto library☆11Updated last year