khovratovich / Argon2
Memory-hard scheme Argon2
☆202Updated 4 years ago
Alternatives and similar repositories for Argon2:
Users that are interested in Argon2 are comparing it to the libraries listed below
- Noise Specification☆452Updated 6 years ago
- Reference implementations (software)☆85Updated 8 years ago
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago
- Double Ratchet Algorithm☆375Updated 8 years ago
- ☆88Updated 9 years ago
- ☆57Updated 8 years ago
- Yubico Universal 2nd Factor (U2F) Server C Library☆97Updated 4 years ago
- WARNING: Deprecated! See Privacy Pass☆98Updated 8 years ago
- privilege separation engine for OpenSSL / LibreSSL☆196Updated 10 months ago
- A reversible DER and BER pretty-printer.☆242Updated this week
- Pond☆910Updated 3 years ago
- ZeroDB server and client-side example of using it☆135Updated 8 years ago
- X.509 certificate linter☆156Updated 5 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Updated 2 years ago
- A public database for software and firmware hashes☆214Updated 8 years ago
- Authenticated encryption for streams and arbitrary large files using libsodium☆53Updated 4 years ago
- A tool to fingerprint SSL/TLS servers☆268Updated 3 years ago
- Best Current Practices regarding secure online communication and configuration of services using cryptography.☆704Updated 3 years ago
- Scripts to parse and analyze pgp key server data☆33Updated 4 years ago
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆474Updated 5 years ago
- A list of certificates shipped by various vendors and Open Source Projects☆38Updated 9 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆123Updated 7 years ago
- A library for off-the-record (deniable authenticated forward secure confidential) multiparty messaging☆407Updated 7 years ago
- This repository contains firmware for the OneRNG entropy generator☆49Updated 9 years ago
- Quantum Insert detector/recorder☆306Updated 5 years ago
- The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more se…☆490Updated 3 weeks ago
- Crema: A Sub-Turing Programming Language☆65Updated 9 years ago
- Abusing U2F to 'store' a stable secret☆16Updated 9 years ago
- **NOT MAINTAINED** Bud - The TLS Terminator☆451Updated 6 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆102Updated 4 years ago