jedisct1 / spritz
A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.
☆27Updated 9 years ago
Alternatives and similar repositories for spritz:
Users that are interested in spritz are comparing it to the libraries listed below
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- Authenticated Blowfish-encrypted pipe☆23Updated 7 years ago
- Optimized block functions for the ChaCha stream cipher☆51Updated 5 years ago
- SHA-3 finalist (reference code)☆39Updated 11 years ago
- Several example uses of TPM2/TSS APIs.☆10Updated 9 years ago
- Library for getting information about running processes☆11Updated 9 years ago
- Lightweight cryptographic hash functions (reference code)☆16Updated 11 years ago
- SipHash AVX2 implementation in C☆15Updated 9 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆45Updated 10 years ago
- A x86 Virtual Machine Monitor including device modules and instruction emulator. Standalone version of the Vancouver VMM.☆43Updated 3 years ago
- an experimental distribution based on musl libc and busybox☆12Updated 7 years ago
- asrepl: x86-64 assembly REPL☆69Updated 8 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- Cymric - Portable secure random number generator☆21Updated 11 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- A tiny framebuffer image viewer☆13Updated 9 years ago
- relatively sane looking dns library. forked and splitted source into one C file per function for smaller linkage.☆17Updated 2 years ago
- rasta ring 0 debugger☆77Updated 16 years ago
- A minimalist IP stack written in ANSI C.☆52Updated last year
- Generator of "nothing-up-my-sleeve" constants☆24Updated 9 years ago
- Haxathon Supremacy Virtual Machine☆32Updated 7 years ago
- blocking socket library with SSL, SOCKS/HTTP proxy chaining, and timeout☆40Updated 3 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago
- some core unix utils with focus on simplicity and ability to build standalone.☆40Updated last year
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆99Updated 7 years ago
- Dynamic instrumentation of the Linux kernel☆40Updated 10 years ago
- Sample of standalone portable C to verify Ed25519 public-key signature☆20Updated 8 years ago
- C implementation of SHA3 (Keccak)☆21Updated 3 years ago
- A very tiny C library for establishing SSL/TLS network connection.☆11Updated 6 years ago