khovratovich / Argon2Links
Memory-hard scheme Argon2
☆207Updated 4 years ago
Alternatives and similar repositories for Argon2
Users that are interested in Argon2 are comparing it to the libraries listed below
Sorting:
- Noise Specification☆459Updated 7 years ago
- Reference implementations (software)☆85Updated 9 years ago
- Double Ratchet Algorithm☆376Updated 9 years ago
- WARNING: Deprecated! See Privacy Pass☆99Updated 8 years ago
- Totally Isolated TLS Unwrapping Server☆110Updated 5 years ago
- ☆58Updated 8 years ago
- Pond☆917Updated 4 years ago
- axolotl based on libsodium☆22Updated 9 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Updated 4 years ago
- ☆89Updated 9 years ago
- privilege separation engine for OpenSSL / LibreSSL☆204Updated last year
- A list of certificates shipped by various vendors and Open Source Projects☆38Updated 10 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆120Updated 8 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 10 years ago
- Provably Anonymous Overlay☆325Updated 11 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Updated 3 years ago
- ☆100Updated 9 years ago
- A reversible DER and BER pretty-printer.☆247Updated last month
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆192Updated 3 years ago
- A library for off-the-record (deniable authenticated forward secure confidential) multiparty messaging☆406Updated 8 years ago
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆58Updated 9 years ago
- Golang "Post-quantum key exchange – a new hope." (Mirror of https://gitlab.com/yawning/newhope)☆79Updated 6 years ago
- The "Intel x86 considered harmful" paper☆200Updated 9 years ago
- A memory-hard password hashing function.☆71Updated 2 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆122Updated 8 years ago
- One-end encryption, stronger than end-to-end☆221Updated 2 years ago
- A CONIKS implementation in Java☆60Updated 7 years ago
- A tool to fingerprint SSL/TLS servers☆265Updated 4 years ago
- A public database for software and firmware hashes☆214Updated 9 years ago
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆474Updated 6 years ago