khovratovich / Argon2
Memory-hard scheme Argon2
☆202Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Argon2
- Noise Specification☆449Updated 6 years ago
- Reference implementations (software)☆85Updated 7 years ago
- Double Ratchet Algorithm☆377Updated 8 years ago
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Updated 2 years ago
- ☆87Updated 8 years ago
- ZeroDB server and client-side example of using it☆135Updated 8 years ago
- ☆57Updated 7 years ago
- privilege separation engine for OpenSSL / LibreSSL☆193Updated 5 months ago
- WARNING: Deprecated! See Privacy Pass☆98Updated 7 years ago
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆474Updated 5 years ago
- Optimized block functions for the ChaCha stream cipher☆47Updated 4 years ago
- Sphinx-based Password Storage low-level library☆128Updated 5 months ago
- ☆97Updated 8 years ago
- Pond☆912Updated 2 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆101Updated 3 years ago
- BLAKE2 official implementations☆655Updated last year
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆116Updated 7 years ago
- A memory-hard password hashing function.☆68Updated last year
- A public database for software and firmware hashes☆215Updated 7 years ago
- Constant-Time Toolkit☆294Updated 6 years ago
- Authenticated encryption for streams and arbitrary large files using libsodium☆53Updated 3 years ago
- A library for off-the-record (deniable authenticated forward secure confidential) multiparty messaging☆404Updated 7 years ago
- One-end encryption, stronger than end-to-end☆196Updated last year
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆59Updated 8 years ago
- axolotl based on libsodium☆22Updated 8 years ago
- A collection of email messages which have been gathered for testing implementations.☆87Updated 7 years ago
- Checking that functions are constant time with Valgrind☆175Updated 7 years ago
- A CONIKS implementation in Java☆60Updated 6 years ago