A really tiny crypto library.
☆166Dec 26, 2025Updated 4 months ago
Alternatives and similar repositories for charm
Users that are interested in charm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Xoocycle, a C90 implementation of the Xoodyak hash and AEAD construction☆10Mar 28, 2019Updated 7 years ago
- A lightweight, secure, easy-to-use crypto library suitable for constrained environments.☆764Updated this week
- A Zig version of the Charm crypto library.☆88Jan 8, 2026Updated 3 months ago
- NIST Lightweight Cryptography Primitives☆55Jun 10, 2022Updated 3 years ago
- The dum^H^H^Hsimplest encryption tool in the world.☆234Sep 19, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An EXPERIMENTAL Go implementation of the CPace PAKE, instantiated with the ristretto255 group.☆29Feb 11, 2021Updated 5 years ago
- Signcryption using libsodium.☆69Jan 1, 2026Updated 4 months ago
- Readable Implementation of Strobe in Go☆26Jan 3, 2022Updated 4 years ago
- ☆39Dec 16, 2021Updated 4 years ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆28Jan 1, 2026Updated 4 months ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Apr 11, 2026Updated 3 weeks ago
- A mirror of VTUN, with some changes☆69Jul 22, 2019Updated 6 years ago
- simple and efficient hashtable implementation for C, taken from musl's hsearch()☆21Feb 1, 2023Updated 3 years ago
- Multipath UDP tunnel☆750Feb 2, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Example of CRUSH compression with optimal parsing using BriefLZ algorithms☆16Nov 1, 2023Updated 2 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 10 months ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- C crypto library☆25Aug 2, 2023Updated 2 years ago
- Example of LZ4 compression with optimal parsing using BriefLZ algorithms☆28Nov 1, 2023Updated 2 years ago
- Peggy is a PEG parser generator for Go.☆20Oct 22, 2025Updated 6 months ago
- An implementation of the ROCCA-S encryption scheme.☆20Mar 13, 2026Updated last month
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 22, 2026Updated last week
- Package fourq implements FourQ, a high-speed elliptic curve at the 128-bit security level.☆54Apr 24, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆31Aug 5, 2024Updated last year
- System tuning recommendations for running cryptographic applications☆23Jun 13, 2016Updated 9 years ago
- Pong revolution.☆16Oct 26, 2025Updated 6 months ago
- NaCL pipe☆23Nov 18, 2018Updated 7 years ago
- NIST Lightweight Cryptography finalists☆12May 7, 2022Updated 3 years ago
- Implementation of Kravatte Encryption Suite☆15Dec 2, 2018Updated 7 years ago
- A bad XML parser☆22Sep 2, 2024Updated last year
- An easy to use, easy to deploy crypto library☆733Apr 7, 2026Updated 3 weeks ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆130Apr 2, 2026Updated last month
- Elliptic curves Rust reference implementation☆16Mar 10, 2024Updated 2 years ago
- A tiny, portable implementation of the IPCrypt specification in C.☆32Apr 8, 2026Updated 3 weeks ago
- Plug-and-play IP rate limiter in C☆26Sep 1, 2025Updated 8 months ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 9 years ago
- 3d model for Ziggy the Ziguana☆15Feb 18, 2022Updated 4 years ago
- PoC of Swift for Compute@Edge☆12Feb 3, 2022Updated 4 years ago