jedisct1 / ping
Pong revolution.
☆13Updated 5 years ago
Alternatives and similar repositories for ping:
Users that are interested in ping are comparing it to the libraries listed below
- A DNS library for Rust.☆23Updated last month
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆29Updated 11 months ago
- A simple tool to fetch and filter domain blacklists for use with tools like https://github.com/DNSCrypt/dnscrypt-proxy☆23Updated 2 years ago
- Argon2 key derivation function in zig.☆15Updated 3 years ago
- An init utility purely written in Rust.☆24Updated 7 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 6 months ago
- tamper resistant audit log☆18Updated 6 years ago
- (Oblivious) DoH Server☆27Updated 3 years ago
- sign elf binaries with GPG☆18Updated 8 years ago
- ☆19Updated 4 years ago
- A golang implementation of Ed448-Goldilocks. This is a mirror of https://bugs.otr.im/otrv4/ed448☆40Updated 2 years ago
- A tool to extract code from individual functions in a library.☆15Updated 2 months ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Updated 3 years ago
- A proof-of-concept for a read-only filesystem with random contents generated on demand.☆38Updated 3 years ago
- Rust implementation of CryptoURI: URN-like namespace for cryptographic objects with Bech32-based encoding☆36Updated last year
- Stolen WiFi Aggregate Tunneling Protocol Dæmon (RAID your internet connections!)☆17Updated 12 years ago
- Docker image: DNS over HTTPS proxy☆11Updated 4 years ago
- BAT KEM/Signature Reference Implementation☆20Updated 3 years ago
- Executable PNGS☆8Updated 4 years ago
- Elliptic curves Rust reference implementation☆15Updated 11 months ago
- A BastilleBSD template to run Firefox in a secure containerized environment☆8Updated 3 years ago
- A docker image to host one's DNS-over-HTTPS proxy☆27Updated 5 years ago
- PGP key poisoner☆36Updated 5 years ago
- A tweakable block cipher☆31Updated 9 months ago
- ipcrypt implementation in C☆31Updated 4 years ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated 11 months ago
- Optimized version of the reference implementation of Ed25519☆36Updated last year
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- Sample of standalone portable C to verify Ed25519 public-key signature☆20Updated 8 years ago