jedisct1 / ipcrypt2Links
A tiny library to properly encrypt IP addresses.
☆18Updated last week
Alternatives and similar repositories for ipcrypt2
Users that are interested in ipcrypt2 are comparing it to the libraries listed below
Sorting:
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 3 months ago
- Header-only portable implementations of common Intel intrisics, including cryptographic instructions.☆13Updated last month
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆35Updated 6 months ago
- A DNS library for Rust.☆23Updated 2 months ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated this week
- Shows CPUID features and instruction encodings used by x86/x64 binaries☆16Updated 2 weeks ago
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆16Updated 3 months ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆14Updated 2 years ago
- A tweakable block cipher☆31Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 10 months ago
- ChaCha20 + Poly1305☆23Updated 9 years ago
- 100% XXTEA authenticated, chunked file encryption☆18Updated 4 years ago
- Online engine for reasoning about the Noise Protocol Framework.☆13Updated 7 months ago
- Compress sets of integers efficiently☆21Updated 2 months ago
- HPKE implementation for Zig.☆17Updated 3 months ago
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- ☆23Updated last month
- Argon2 key derivation function in zig.☆15Updated 3 years ago
- Compiler from Webassembly to native binaries☆11Updated last year
- Methods for IP Address Encryption and Obfuscation.☆12Updated last week
- A standalone AES-KW (AES Key Wrap) implementation.☆14Updated last year
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆19Updated 2 years ago
- A port of the Google Randen fast backtracking-resistant random generator to the C language.☆27Updated 7 years ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated last year
- ☆19Updated 4 years ago
- Tracks runtime instruction execution in Linux programs☆34Updated 11 years ago
- ☆12Updated last year
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆26Updated 2 weeks ago
- Converts ELF, mach-o, or PE binaries to a JSON representation☆32Updated 9 years ago