khovratovich / Argon2Links
Memory-hard scheme Argon2
☆207Updated 4 years ago
Alternatives and similar repositories for Argon2
Users that are interested in Argon2 are comparing it to the libraries listed below
Sorting:
- Noise Specification☆459Updated 7 years ago
- Reference implementations (software)☆85Updated 9 years ago
- Totally Isolated TLS Unwrapping Server☆110Updated 5 years ago
- Double Ratchet Algorithm☆376Updated 9 years ago
- WARNING: Deprecated! See Privacy Pass☆99Updated 8 years ago
- ☆89Updated 9 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Updated 4 years ago
- privilege separation engine for OpenSSL / LibreSSL☆203Updated last year
- An implementation of the axolotl ratchet based on libsodium.☆23Updated 3 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆120Updated 8 years ago
- A list of certificates shipped by various vendors and Open Source Projects☆38Updated 10 years ago
- ☆58Updated 8 years ago
- A reversible DER and BER pretty-printer.☆248Updated last month
- ZeroDB server and client-side example of using it☆136Updated 9 years ago
- Pond☆916Updated 3 years ago
- Authenticated encryption for streams and arbitrary large files using libsodium☆52Updated 4 years ago
- Yubico Universal 2nd Factor (U2F) Server C Library☆97Updated 5 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 10 years ago
- axolotl based on libsodium☆22Updated 9 years ago
- The "Intel x86 considered harmful" paper☆199Updated 9 years ago
- Use OpenPGP-based encryption in Yahoo mail.☆222Updated 9 years ago
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆474Updated 6 years ago
- A memory-hard password hashing function.☆71Updated 2 years ago
- A public database for software and firmware hashes☆214Updated 9 years ago
- Yubico Universal 2nd Factor (U2F) Host C Library☆323Updated 5 years ago
- One-end encryption, stronger than end-to-end☆220Updated 2 years ago
- Provably Anonymous Overlay☆325Updated 11 years ago
- TLS Library in python☆237Updated 3 years ago
- secure parasitic rdate replacement☆370Updated 8 years ago
- A CONIKS implementation in Java☆60Updated 7 years ago