lukaspustina / shick_crypto
Crypto library showing how to use NaCl and libsodium to encrypt and decrypt message securely.
☆23Updated 10 years ago
Related projects: ⓘ
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆32Updated 9 years ago
- ipcrypt implementation in C☆30Updated 3 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 7 years ago
- ☆22Updated this week
- axolotl based on libsodium☆22Updated 8 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆27Updated 6 years ago
- Reference implementations (software)☆85Updated 7 years ago
- A fast secure userspace pseudorandom number generator☆81Updated 10 years ago
- Derive Curve25519 encryption keys and ed25519 signing keys from username and password via BLAKE2s hash and scrypt.☆20Updated 8 years ago
- ZINA is a secure messaging protocol for mobile devices☆20Updated 6 years ago
- Bidirectional secure channels over TCP/IP☆26Updated 4 years ago
- An implementation of the OPAQUE password-authenticated key exchange protocol☆10Updated last week
- mozilla: Firefox's X.509 certificate verification core code.☆22Updated 8 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- ☆20Updated this week
- AVX2 Chacha implementation☆16Updated 10 years ago
- Encrypted, compressed, distributed backups☆26Updated 8 years ago
- A SPAKE2+ Elligator Edition implementation for libsodium 1.0.16+☆38Updated 3 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Updated 7 years ago
- secp521r1 and AES-256-CTR with HMAC-SHA-384☆50Updated 9 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆24Updated 3 years ago
- Reference Implementation of Catena, a memory-consuming password scrambler☆31Updated 6 years ago
- Towards an IETF RFC for XChaCha20-Poly1305☆28Updated 4 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Updated last year
- Standalone implemention of authenticated encryption algorithms☆11Updated 2 years ago
- ☆9Updated 7 years ago
- Plug-and-play IP rate limiter in C☆24Updated 3 years ago
- C version of the MetroHash function☆26Updated 9 years ago
- Go implementation of libhydrogen - a lightweight, easy-to-use crypto library☆24Updated 7 years ago
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆34Updated 6 years ago