jedisct1 / charmLinks
A really tiny crypto library.
☆160Updated 4 months ago
Alternatives and similar repositories for charm
Users that are interested in charm are comparing it to the libraries listed below
Sorting:
- AES-GCM-SIV implementations (128 and 256 bit)☆118Updated 6 years ago
- Sphinx-based Password Storage low-level library☆130Updated 7 months ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆69Updated 4 years ago
- The BLAKE3 paper: specifications, analysis, and design rationale☆180Updated 3 years ago
- Noise-C, a plain C implementation of the Noise protocol☆334Updated last year
- libtls tutorial, exercises, test CA and exercise solutions☆162Updated last year
- A CPace PAKE implementation using libsodium.☆36Updated 4 years ago
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆95Updated last week
- Implementations of a fast Message-Authentication Code☆120Updated 2 years ago
- CRYPTOGAMS distribution repository☆59Updated this week
- Yet another signify tool☆90Updated last year
- Jitterentropy Library☆121Updated this week
- A memory-hard password hashing function.☆70Updated 2 years ago
- A tiny secret store to keep your little secrets☆72Updated 3 months ago
- A tweakable block cipher☆31Updated last year
- C library providing BLAKE2b, BLAKE2s, BLAKE2bp, BLAKE2sp☆135Updated 2 years ago
- A fast secure userspace pseudorandom number generator☆83Updated 11 years ago
- BSD-licensed C99/POSIX library code shared between tarsnap, scrypt, kivaloo, spiped, and bsdiff.☆116Updated last month
- Bootstrapping Secure Communication without Leaking Metadata☆77Updated 5 years ago
- A public domain constant-time implementation of ChaCha20 on 8-bit AVR microcontroller.☆32Updated 7 years ago
- A port of the Google Randen fast backtracking-resistant random generator to the C language.☆27Updated 7 years ago
- C library that implements the OTR protocol.☆63Updated 9 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- Fast PBKDF2 implementation in C☆166Updated 3 years ago
- Pufferfish2 password hashing scheme☆59Updated last year
- Stupid simple password safe☆38Updated 6 years ago
- High performance command line tool for stream encryption☆108Updated 4 years ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆339Updated 3 years ago
- Optimized block functions for the ChaCha stream cipher☆51Updated 5 years ago
- some core unix utils with focus on simplicity and ability to build standalone.☆41Updated last year