jedisct1 / ipcrypt2Links
A tiny library to properly encrypt IP addresses.
☆20Updated 2 months ago
Alternatives and similar repositories for ipcrypt2
Users that are interested in ipcrypt2 are comparing it to the libraries listed below
Sorting:
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 5 months ago
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆18Updated last month
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated last month
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆37Updated 8 months ago
- A Secure and Memory-Efficient Heap Allocator☆33Updated last year
- FPE - Format Preserving Encryption with FF3 in C☆14Updated last month
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 7 years ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- ☆24Updated 3 months ago
- A cache hard password hash/KDF☆47Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- A tweakable block cipher☆31Updated last year
- AEGIS-256☆10Updated 3 years ago
- Methods for IP Address Encryption and Obfuscation.☆12Updated this week
- The wolfSSL Command Line Utility wolfCLU☆19Updated 2 weeks ago
- A collection of high-performance crypto implementations.☆53Updated 3 months ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆15Updated 4 years ago
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆93Updated last month
- Shows CPUID features and instruction encodings used by x86/x64 binaries☆16Updated last week
- ☆10Updated last year
- Tool for findings bugs in epoll-based Linux servers☆32Updated 4 years ago
- A simple, decompressing executable packer☆45Updated 3 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- ☆12Updated last year
- CPUID database derived from InstLatx64☆14Updated 5 years ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆30Updated 6 months ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆12Updated 2 weeks ago
- Random experiments and shenanigans☆13Updated 2 months ago
- Compress sets of integers efficiently☆22Updated 4 months ago
- xxhash-64 in 20 lines☆25Updated last year