jedisct1 / dnssectorLinks
A DNS library for Rust.
☆23Updated 8 months ago
Alternatives and similar repositories for dnssector
Users that are interested in dnssector are comparing it to the libraries listed below
Sorting:
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Updated 4 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 7 months ago
- A simple and secure DNS client crate for Rust.☆37Updated 6 months ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 9 months ago
- tamper resistant audit log☆18Updated 7 years ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated 2 months ago
- ☆20Updated 5 years ago
- Pong revolution.☆16Updated last month
- A small Rust crate to verify Minisign signatures.☆37Updated 6 months ago
- Certificate transparency SCT verification library in rust☆53Updated last week
- A tweakable block cipher☆31Updated last year
- Linkable sandbox explorer☆82Updated 10 months ago
- Deploy self-contained binaries from GCP Container Registry (gcr.io) as systemd service units☆32Updated 11 months ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆14Updated 3 years ago
- DKIM (RFC6376) implementation☆56Updated last year
- Specifications for Privacy Proxy Implementations☆31Updated 2 weeks ago
- Blazingly fast Linux syscall collector☆74Updated 7 years ago
- Elliptic curves Rust reference implementation☆16Updated last year
- tools for creating, inspecting and modifying torrent files☆12Updated 3 years ago
- ☆25Updated last year
- Rust bindings to the Knot Resolver library (also known as libkres)☆17Updated 6 years ago
- Build docker images for dsvpn.☆17Updated 4 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Experimental implementation of the Distributed Aggregation Protocol (DAP) specification.☆63Updated this week
- An attack/exploit Detector that utilizes Polymorphism and Diversity☆30Updated 3 years ago
- ☆25Updated 6 months ago
- ☆22Updated 7 months ago
- ☆10Updated 10 months ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 5 months ago