FASTEST /dev/urandom PRNG available
☆50Oct 30, 2025Updated 5 months ago
Alternatives and similar repositories for srandom
Users that are interested in srandom are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Nov 12, 2022Updated 3 years ago
- Big unsigned integers (128, 256, 384, 512 or more bits), big (signed) integers and big decimal numbers.☆12Mar 4, 2024Updated 2 years ago
- ☆16Mar 6, 2026Updated last month
- A Simple Archive Format☆10Sep 17, 2021Updated 4 years ago
- ☆14Aug 21, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- AVX2 Chacha implementation☆16Nov 23, 2013Updated 12 years ago
- Cryptimage is an open source software which purpose is to reproduce old analog TV encryption systems like "discret 11", "nagravision syst…☆23Dec 26, 2025Updated 3 months ago
- All CANAL+ R7 project open source packages for Set Top Boxes products☆27Jan 18, 2018Updated 8 years ago
- A Golang implementation of the AES-FFX Format-Preserving Encryption Scheme☆10Mar 14, 2015Updated 11 years ago
- FPE - Format Preserving Encryption with FF3 in C☆14Apr 3, 2026Updated last week
- ☆11Jun 2, 2015Updated 10 years ago
- Compact, non-backtracking, unicode aware regular expressions in C89☆10Apr 17, 2025Updated 11 months ago
- A simple UDP load balancer in Golang. Works with IPsec.☆12Nov 23, 2017Updated 8 years ago
- ☆11May 26, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Linux Kernel for Redmi Note 9T 5G☆20Jun 20, 2022Updated 3 years ago
- will never support rui or salaa, go away☆13Feb 16, 2025Updated last year
- Yet another proxy router☆13Apr 3, 2026Updated last week
- ☆11Apr 1, 2026Updated last week
- ☆11Aug 14, 2024Updated last year
- Cryptris, a game about asymmetric cryptography☆18Sep 6, 2014Updated 11 years ago
- Regular Expression Pattern Analyzer☆18Aug 9, 2023Updated 2 years ago
- ☆10Oct 6, 2025Updated 6 months ago
- ☆21Jun 17, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Sequence data structure with efficient random access insert and erase☆13Aug 15, 2023Updated 2 years ago
- AEAD cipher based on ChaCha20 stream cipher and Poly1305 MAC☆10Feb 18, 2022Updated 4 years ago
- ☆10Dec 27, 2023Updated 2 years ago
- A script that creates importable tar files for Windows Subsystem for Linux (WSL2). These files can be used to install any Linux distribut…☆95Updated this week
- blending sam with the shell experiment☆23Mar 25, 2019Updated 7 years ago
- A custom low-memory-killer for Android, with a different approach.Read the README before using this.☆38Jun 4, 2021Updated 4 years ago
- Verilog code of Loongson's GS132 core☆12Dec 19, 2019Updated 6 years ago
- SIMDized check which bytes are in a set☆28Oct 21, 2018Updated 7 years ago
- Barrio typeface recover the freshness of the street little shops.☆15Mar 13, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- JavaScript bzip2 implementation☆19Nov 4, 2012Updated 13 years ago
- Generate strong passwords using /dev/urandom 👻☆15Aug 7, 2017Updated 8 years ago
- HashTable implementation that uses a hybrid algorithm to achieve constant time and memory usage.☆19May 27, 2019Updated 6 years ago
- Tool to generate Android build system files (Android.mk, Android.bp) from APK automatically.☆10Nov 1, 2021Updated 4 years ago
- Comprehensive CPU frequency performance/power benchmark☆177Dec 2, 2024Updated last year
- tfcrypt -- high security Threefish encryption tool.☆10Aug 9, 2023Updated 2 years ago
- C++ console application that features unique (at least I think so) symmetric key based file encryption algorithm.☆53May 17, 2022Updated 3 years ago