A really tiny crypto library.
☆165Dec 26, 2025Updated 2 months ago
Alternatives and similar repositories for charm
Users that are interested in charm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Xoocycle, a C90 implementation of the Xoodyak hash and AEAD construction☆10Mar 28, 2019Updated 6 years ago
- A lightweight, secure, easy-to-use crypto library suitable for constrained environments.☆756Feb 13, 2026Updated last month
- A Dead Simple VPN.☆5,310Dec 26, 2025Updated 2 months ago
- A Zig version of the Charm crypto library.☆88Jan 8, 2026Updated 2 months ago
- AEGIS-256☆11Apr 17, 2022Updated 3 years ago
- C implementation of the BlaBla20 cipher☆10Jan 1, 2026Updated 2 months ago
- The dum^H^H^Hsimplest encryption tool in the world.☆233Sep 19, 2025Updated 6 months ago
- An EXPERIMENTAL Go implementation of the CPace PAKE, instantiated with the ristretto255 group.☆29Feb 11, 2021Updated 5 years ago
- Signcryption using libsodium.☆69Jan 1, 2026Updated 2 months ago
- ☆38Dec 16, 2021Updated 4 years ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆28Jan 1, 2026Updated 2 months ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Jul 15, 2023Updated 2 years ago
- A mirror of VTUN, with some changes☆68Jul 22, 2019Updated 6 years ago
- simple and efficient hashtable implementation for C, taken from musl's hsearch()☆21Feb 1, 2023Updated 3 years ago
- Multipath UDP tunnel☆745Feb 2, 2022Updated 4 years ago
- Example of CRUSH compression with optimal parsing using BriefLZ algorithms☆16Nov 1, 2023Updated 2 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Oct 26, 2023Updated 2 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- Example of LZ4 compression with optimal parsing using BriefLZ algorithms☆28Nov 1, 2023Updated 2 years ago
- An implementation of the ROCCA-S encryption scheme.☆20Mar 13, 2026Updated last week
- Package fourq implements FourQ, a high-speed elliptic curve at the 128-bit security level.☆54Oct 14, 2024Updated last year
- System tuning recommendations for running cryptographic applications☆23Jun 13, 2016Updated 9 years ago
- Pong revolution.☆16Oct 26, 2025Updated 4 months ago
- Noise-C, a plain C implementation of the Noise protocol☆362Jul 18, 2024Updated last year
- NIST Lightweight Cryptography finalists☆12May 7, 2022Updated 3 years ago
- Implementation of Kravatte Encryption Suite☆15Dec 2, 2018Updated 7 years ago
- An easy to use, easy to deploy crypto library☆712Nov 1, 2024Updated last year
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆128Updated this week
- A tiny, portable implementation of the IPCrypt specification in C.☆32Feb 3, 2026Updated last month
- Repository for the current status of the LESS submission☆13Mar 16, 2026Updated last week
- Elliptic curves Rust reference implementation☆16Mar 10, 2024Updated 2 years ago
- Plug-and-play IP rate limiter in C☆26Sep 1, 2025Updated 6 months ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- Portable C, C++ code for hash tables, bloom filters, string-search, string utilities, hash functions, arc4random☆58Jan 15, 2026Updated 2 months ago
- 3d model for Ziggy the Ziguana☆15Feb 18, 2022Updated 4 years ago
- PoC of Swift for Compute@Edge☆12Feb 3, 2022Updated 4 years ago
- A Secure and Memory-Efficient Heap Allocator☆34Jun 21, 2024Updated last year