jedisct1 / ipcrypt2Links
A tiny library to properly encrypt IP addresses.
☆18Updated 3 weeks ago
Alternatives and similar repositories for ipcrypt2
Users that are interested in ipcrypt2 are comparing it to the libraries listed below
Sorting:
- Header-only portable implementations of common Intel intrisics, including cryptographic instructions.☆14Updated 2 months ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 4 months ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆36Updated 6 months ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated last week
- A tweakable block cipher☆31Updated last year
- ☆12Updated last year
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆16Updated this week
- A Secure and Memory-Efficient Heap Allocator☆33Updated last year
- AEGIS-256☆10Updated 3 years ago
- A cache hard password hash/KDF☆47Updated last year
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- Methods for IP Address Encryption and Obfuscation.☆12Updated last month
- A more realistic demo of a buffer overflow cause by -ffast-math☆14Updated 2 years ago
- Compiler from Webassembly to native binaries☆11Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 11 months ago
- Argon2 key derivation function in zig.☆15Updated 3 years ago
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆91Updated last month
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆19Updated 2 years ago
- A collection of high-performance crypto implementations.☆52Updated 2 months ago
- A simple, decompressing executable packer☆47Updated 3 years ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 7 years ago
- QARMA block cipher in C☆30Updated 2 years ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated last year
- ☆23Updated last month
- Very simple cross-platform utility to manage your git identities.☆10Updated 2 years ago
- An implementation of the ROCCA-S encryption scheme.☆20Updated 8 months ago
- FPE - Format Preserving Encryption with FF3 in C☆13Updated 2 weeks ago
- Minimal setup to trigger the xz backdoor☆28Updated 8 months ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year