jedisct1 / randen-rngLinks
A port of the Google Randen fast backtracking-resistant random generator to the C language.
☆27Updated 7 years ago
Alternatives and similar repositories for randen-rng
Users that are interested in randen-rng are comparing it to the libraries listed below
Sorting:
- Quick sort code using AVX2 instructions☆69Updated 8 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Updated 8 years ago
- ☆13Updated 2 years ago
- Random Number Generator based on hardware-accelerated AES instructions☆61Updated 6 years ago
- Methods and Benchmarks for Random Numbers in a Range☆37Updated 7 years ago
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆112Updated last week
- Plug-and-play IP rate limiter in C☆26Updated 4 months ago
- Branchless UTF-8 decoder☆36Updated 8 years ago
- A small DFA for under 16 states☆54Updated 7 years ago
- NetBSD cdb (constant database) library☆14Updated 6 years ago
- Counting the collisions with perl hash tables per function☆12Updated 6 years ago
- 8-bit Xor Filter in C99☆63Updated 6 years ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- Using clang and llvm to compile C into Web Assembly☆28Updated 6 years ago
- An AES-based 384 bit permutation.☆21Updated 8 months ago
- A CPace PAKE implementation using libsodium.☆40Updated 5 years ago
- A Secure and Memory-Efficient Heap Allocator☆34Updated last year
- Optimised x86-64 gzip decompressor☆32Updated 7 years ago
- A simple, decompressing executable packer☆46Updated 3 years ago
- A cache hard password hash/KDF☆48Updated last year
- A really tiny crypto library.☆165Updated 3 weeks ago
- Experiments in C++: binary fuse filters vs. Bloom filters☆48Updated last year
- PureDB is a portable and tiny set of libraries for creating and reading constant databases.☆35Updated 2 years ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 2 weeks ago
- Compact tries for fixed-width keys☆26Updated 7 years ago
- ☆25Updated 8 months ago
- ☆28Updated 3 years ago
- UMASH: a fast enough hash and fingerprint with collision bounds☆159Updated last week
- Read-only compound literal objects☆24Updated 2 years ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆38Updated last year