khovratovich / Argon2
Memory-hard scheme Argon2
☆202Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Argon2
- Noise Specification☆449Updated 6 years ago
- Reference implementations (software)☆85Updated 8 years ago
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago
- ☆88Updated 8 years ago
- Double Ratchet Algorithm☆377Updated 8 years ago
- privilege separation engine for OpenSSL / LibreSSL☆193Updated 6 months ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆117Updated 7 years ago
- ☆57Updated 7 years ago
- ZeroDB server and client-side example of using it☆135Updated 8 years ago
- WARNING: Deprecated! See Privacy Pass☆98Updated 7 years ago
- A CONIKS implementation in Java☆60Updated 6 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆101Updated 3 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Updated 2 years ago
- One-end encryption, stronger than end-to-end☆196Updated last year
- A memory-hard password hashing function.☆68Updated last year
- Supersingular Isogeny Diffie-Hellman in Go☆133Updated 5 years ago
- BLAKE2 official implementations☆657Updated last year
- A reversible DER and BER pretty-printer.☆237Updated 2 months ago
- Authenticated encryption for streams and arbitrary large files using libsodium☆53Updated 3 years ago
- A library for off-the-record (deniable authenticated forward secure confidential) multiparty messaging☆404Updated 7 years ago
- Pond☆912Updated 2 years ago
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆474Updated 5 years ago
- Constant-Time Toolkit☆294Updated 6 years ago
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆189Updated 2 years ago
- X.509 certificate linter☆157Updated 4 years ago
- Yubico Universal 2nd Factor (U2F) Server C Library☆95Updated 4 years ago
- Microcode parser for AMD, Intel, and VIA processors☆134Updated 8 years ago
- Optimized block functions for the ChaCha stream cipher☆47Updated 4 years ago
- Password Hashing Competition Submissions☆69Updated 10 years ago
- Deprecated - MIG Memory Forensic library☆388Updated 2 years ago