khovratovich / Argon2View external linksLinks
Memory-hard scheme Argon2
☆208Jan 9, 2021Updated 5 years ago
Alternatives and similar repositories for Argon2
Users that are interested in Argon2 are comparing it to the libraries listed below
Sorting:
- Password hashing scheme Argon☆18Feb 1, 2015Updated 11 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Public working documents (e.g., Internet drafts)☆26Jun 8, 2018Updated 7 years ago
- axolotl based on libsodium☆22Jul 25, 2016Updated 9 years ago
- Non-C Implementations of the yescrypt KDF.☆30Jan 16, 2019Updated 7 years ago
- C library providing BLAKE2b, BLAKE2s, BLAKE2bp, BLAKE2sp☆139May 14, 2023Updated 2 years ago
- BLST-Verification☆23Jan 22, 2026Updated 3 weeks ago
- ☆12May 7, 2021Updated 4 years ago
- ipcrypt implementation in C☆33Apr 18, 2025Updated 9 months ago
- Argon2 password hashing scheme in pure Go☆35Sep 25, 2024Updated last year
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Oct 4, 2022Updated 3 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 2 years ago
- a CCA-secure module-lattice-based KEM☆17Dec 21, 2018Updated 7 years ago
- Mirror of freehaven's anonymous research bibliography☆14Feb 10, 2015Updated 11 years ago
- Rust implementation of Noise☆126May 31, 2017Updated 8 years ago
- Reference implementations (software)☆85Nov 11, 2016Updated 9 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- BLS working standard draft☆40Aug 8, 2019Updated 6 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- Password Hashing Competition Submissions☆72Apr 12, 2014Updated 11 years ago
- ☆19Jul 13, 2020Updated 5 years ago
- misc stuff☆19Jun 1, 2017Updated 8 years ago
- The password hash Argon2, winner of PHC☆5,204Aug 6, 2024Updated last year
- We implement Delegatable Anonymous Credentials using Mercurial Signatures☆21Jun 7, 2022Updated 3 years ago
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- Constant Time Operations for Crypto Libraries☆10Jun 22, 2017Updated 8 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Package fourq implements FourQ, a high-speed elliptic curve at the 128-bit security level.☆54Oct 14, 2024Updated last year
- Golang "Post-quantum key exchange – a new hope." (Mirror of https://gitlab.com/yawning/newhope)☆79Sep 2, 2019Updated 6 years ago
- A collection of cryptographic primitives targeted at embedded use.☆344Oct 29, 2023Updated 2 years ago
- C crypto library☆24Aug 2, 2023Updated 2 years ago
- ipcipher implementation in Go☆17Dec 19, 2023Updated 2 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Dec 3, 2020Updated 5 years ago
- ☆15Sep 28, 2020Updated 5 years ago
- Code samples that correctly check the remote server's SSL certificate☆24Feb 22, 2016Updated 9 years ago
- A clean & simple implementation of BLAKE2b and BLAKE2s hash functions -- written while writing the RFC.☆20Nov 3, 2015Updated 10 years ago