khovratovich / Argon2Links
Memory-hard scheme Argon2
☆204Updated 4 years ago
Alternatives and similar repositories for Argon2
Users that are interested in Argon2 are comparing it to the libraries listed below
Sorting:
- Noise Specification☆455Updated 6 years ago
- Reference implementations (software)☆85Updated 8 years ago
- Double Ratchet Algorithm☆377Updated 9 years ago
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago
- ☆58Updated 8 years ago
- WARNING: Deprecated! See Privacy Pass☆98Updated 8 years ago
- ☆89Updated 9 years ago
- privilege separation engine for OpenSSL / LibreSSL☆199Updated last year
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆118Updated 8 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Updated 2 years ago
- A reversible DER and BER pretty-printer.☆245Updated 3 months ago
- A list of certificates shipped by various vendors and Open Source Projects☆38Updated 9 years ago
- Pond☆913Updated 3 years ago
- axolotl based on libsodium☆22Updated 8 years ago
- secure parasitic rdate replacement☆367Updated 7 years ago
- Use OpenPGP-based encryption in Yahoo mail.☆221Updated 8 years ago
- Yubico Universal 2nd Factor (U2F) Server C Library☆97Updated 4 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆106Updated 4 years ago
- ZeroDB server and client-side example of using it☆136Updated 8 years ago
- Authenticated encryption for streams and arbitrary large files using libsodium☆53Updated 4 years ago
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆475Updated 5 years ago
- A CONIKS implementation in Java☆60Updated 6 years ago
- The "Intel x86 considered harmful" paper☆197Updated 9 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 10 years ago
- X.509 certificate linter☆157Updated 5 years ago
- ☆98Updated 8 years ago
- A library for off-the-record (deniable authenticated forward secure confidential) multiparty messaging☆404Updated 7 years ago
- Provably Anonymous Overlay☆324Updated 10 years ago
- The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more se…☆494Updated 4 months ago
- Quantum Insert detector/recorder☆307Updated 5 years ago