jedisct1 / spritz
A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.
☆27Updated 9 years ago
Alternatives and similar repositories for spritz:
Users that are interested in spritz are comparing it to the libraries listed below
- Optimized block functions for the ChaCha stream cipher☆49Updated 5 years ago
- Lightweight cryptographic hash functions (reference code)☆16Updated 10 years ago
- SHA-3 finalist (reference code)☆39Updated 10 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- some core unix utils with focus on simplicity and ability to build standalone.☆40Updated last year
- Optimized implementations of Poly1305, a fast message-authentication-code☆44Updated 10 years ago
- asrepl: x86-64 assembly REPL☆69Updated 7 years ago
- A fast AES-PRF based secure random-number generator☆19Updated last year
- Authenticated Blowfish-encrypted pipe☆23Updated 7 years ago
- BearSSL with some bits [see branch upstream for upstream]☆28Updated 8 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- Several example uses of TPM2/TSS APIs.☆10Updated 9 years ago
- A Skein and Threefish software suite for C, Java, and Go☆69Updated 9 years ago
- Cymric - Portable secure random number generator☆21Updated 11 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 6 years ago
- ☆20Updated 9 years ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆99Updated 7 years ago
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- A small suite of scripts and patches for building musl libc cross compilers.☆35Updated 9 years ago
- wrapper library for the functionality offered by ptrace. features facilities to enter breakpoint, debug and hook syscalls, etc.☆21Updated 2 years ago
- Standalone implemention of authenticated encryption algorithms☆11Updated 3 years ago
- empirical measurement of code constructs that seem like they should have constant execution time regardless of values of inputs☆9Updated 9 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 7 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 9 years ago
- SipHash AVX2 implementation in C☆15Updated 9 years ago
- triops: a multiplatform command-line encryption tool using CHACHA + KECCAK☆7Updated 3 years ago
- An implementation of the Salsa20 stream cipher in C99☆115Updated 8 years ago
- Generator of "nothing-up-my-sleeve" constants☆23Updated 9 years ago
- Reference implementations (software)☆85Updated 8 years ago
- Compresses/decompresses the .xz file format☆20Updated 14 years ago