jedisct1 / zig-rocca-sLinks
An implementation of the ROCCA-S encryption scheme.
☆20Updated this week
Alternatives and similar repositories for zig-rocca-s
Users that are interested in zig-rocca-s are comparing it to the libraries listed below
Sorting:
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 9 months ago
- ☆25Updated 8 months ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Updated 8 years ago
- An AES-based 384 bit permutation.☆21Updated 8 months ago
- C implementation of the BlaBla20 cipher☆10Updated last month
- A standalone AES-KW (AES Key Wrap) implementation.☆14Updated 2 years ago
- Multi-threaded cross-platform HTTP/1.1 web server example in Zig.☆34Updated 5 years ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- ☆10Updated last year
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆38Updated last year
- SPARX block ciphers implementations for Rust.☆16Updated 3 years ago
- Non-C Implementations of the yescrypt KDF.☆30Updated 7 years ago
- A port of the Google Randen fast backtracking-resistant random generator to the C language.☆27Updated 7 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆14Updated 10 months ago
- Rust implementation of CryptoURI: URN-like namespace for cryptographic objects with Bech32-based encoding☆37Updated 2 years ago
- A binary serialisation format inspired by YAML, MessagePack and nvlists.☆33Updated 5 years ago
- Constant-time WebAssembly☆20Updated 3 years ago
- An ENGINE gluing together OpenSSL and NaCl-derived crypto.☆18Updated 2 years ago
- Specification for the AEGIS family of authenticated encryption algorithms.☆21Updated last month
- Turns an Arduino (I used a RedStick from Sparkfun) in a cryptography token, allowing you to encrypt and decrypt messages with an unknown …☆12Updated 8 years ago
- A collection of high-performance crypto implementations.☆52Updated 2 months ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 3 weeks ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆29Updated 8 years ago
- Pufferfish2 password hashing scheme☆59Updated 2 years ago
- A cache hard password hash/KDF☆49Updated last year
- ☆13Updated 2 years ago
- Specifications for Privacy Proxy Implementations☆32Updated this week
- XKCP-extracted code for KangarooTwelve (K12)☆52Updated 2 months ago
- Haraka is a secure and efficient short-input hash function.☆59Updated 8 years ago
- Public key encryption system combining X25519 ephemeral Diffie-Hellman key exchange and STREAM-based symmetric cryptography☆26Updated 6 years ago