Memory-hard scheme Argon2
☆208Jan 9, 2021Updated 5 years ago
Alternatives and similar repositories for Argon2
Users that are interested in Argon2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BLST-Verification☆23Apr 22, 2026Updated last week
- Argon2 password hashing scheme in pure Go☆35Sep 25, 2024Updated last year
- Reference implementations (software)☆85Nov 11, 2016Updated 9 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 8 years ago
- axolotl based on libsodium☆22Jul 25, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Non-C Implementations of the yescrypt KDF.☆30Jan 16, 2019Updated 7 years ago
- Password hashing scheme Argon☆18Feb 1, 2015Updated 11 years ago
- C library providing BLAKE2b, BLAKE2s, BLAKE2bp, BLAKE2sp☆138May 14, 2023Updated 2 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Oct 4, 2022Updated 3 years ago
- Public working documents (e.g., Internet drafts)☆26Jun 8, 2018Updated 7 years ago
- ipcrypt implementation in C☆33Apr 18, 2025Updated last year
- Password Hashing Competition Submissions☆73Apr 12, 2014Updated 12 years ago
- Rust implementation of Noise☆127May 31, 2017Updated 8 years ago
- misc stuff☆19Jun 1, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 9 years ago
- The password hash Argon2, winner of PHC☆5,267Aug 6, 2024Updated last year
- A clean & simple implementation of BLAKE2b and BLAKE2s hash functions -- written while writing the RFC.☆20Nov 3, 2015Updated 10 years ago
- ☆12May 7, 2021Updated 4 years ago
- a CCA-secure module-lattice-based KEM☆17Dec 21, 2018Updated 7 years ago
- Experimental High Assurance Cryptographic Library☆21Feb 1, 2016Updated 10 years ago
- A collection of cryptographic primitives targeted at embedded use.☆344Oct 29, 2023Updated 2 years ago
- Go implementation of BLAKE2 (b) cryptographic hash function (optimized for 64-bit platforms).☆94May 23, 2018Updated 7 years ago
- Authenticated encryption for streams and arbitrary large files using libsodium☆54Jan 1, 2026Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- libsodium for Universal Windows Platform (UWP) - A secure cryptographic library☆16Jun 24, 2018Updated 7 years ago
- Mirror of freehaven's anonymous research bibliography☆14Feb 10, 2015Updated 11 years ago
- asynchronous I/O in Rust☆14Jan 8, 2017Updated 9 years ago
- Golang "Post-quantum key exchange – a new hope." (Mirror of https://gitlab.com/yawning/newhope)☆79Sep 2, 2019Updated 6 years ago
- BLS working standard draft☆39Aug 8, 2019Updated 6 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Capture the flag - security challenges☆13Feb 29, 2016Updated 10 years ago
- Code samples that correctly check the remote server's SSL certificate☆24Feb 22, 2016Updated 10 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Jul 11, 2019Updated 6 years ago
- A golang implementation of Ed448-Goldilocks. This is a mirror of https://bugs.otr.im/otrv4/ed448☆42Feb 25, 2023Updated 3 years ago
- Constant Time Operations for Crypto Libraries☆10Jun 22, 2017Updated 8 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Oct 26, 2023Updated 2 years ago
- proposal for blinded-token captchas☆26Jul 19, 2016Updated 9 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- Go implementation of libhydrogen - a lightweight, easy-to-use crypto library☆24Mar 23, 2017Updated 9 years ago