khovratovich / Argon2
Memory-hard scheme Argon2
☆204Updated 4 years ago
Alternatives and similar repositories for Argon2:
Users that are interested in Argon2 are comparing it to the libraries listed below
- Noise Specification☆454Updated 6 years ago
- Reference implementations (software)☆85Updated 8 years ago
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago
- ☆58Updated 8 years ago
- ☆89Updated 9 years ago
- privilege separation engine for OpenSSL / LibreSSL☆197Updated 11 months ago
- WARNING: Deprecated! See Privacy Pass☆98Updated 8 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Updated 2 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆118Updated 8 years ago
- One-end encryption, stronger than end-to-end☆219Updated 2 years ago
- Scripts to parse and analyze pgp key server data☆33Updated 4 years ago
- Constant-Time Toolkit☆295Updated 6 years ago
- ZeroDB server and client-side example of using it☆135Updated 8 years ago
- Yubico Universal 2nd Factor (U2F) Server C Library☆97Updated 4 years ago
- A public database for software and firmware hashes☆214Updated 8 years ago
- Double Ratchet Algorithm☆375Updated 9 years ago
- Crema: A Sub-Turing Programming Language☆66Updated 9 years ago
- Authenticated encryption for streams and arbitrary large files using libsodium☆53Updated 4 years ago
- A tool to fingerprint SSL/TLS servers☆269Updated 3 years ago
- Pond☆911Updated 3 years ago
- Best Current Practices regarding secure online communication and configuration of services using cryptography.☆704Updated 3 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆105Updated 4 years ago
- Freely available cryptographic iconography☆66Updated 8 years ago
- A reversible DER and BER pretty-printer.☆243Updated last month
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 9 years ago
- A clean & simple implementation of BLAKE2b and BLAKE2s hash functions -- written while writing the RFC.☆18Updated 9 years ago
- A list of certificates shipped by various vendors and Open Source Projects☆38Updated 9 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆303Updated 3 years ago
- A memory-hard password hashing function.☆69Updated last year
- The "Intel x86 considered harmful" paper☆196Updated 9 years ago