medsec / catena
Reference Implementation of Catena, a memory-consuming password scrambler
☆31Updated 6 years ago
Alternatives and similar repositories for catena:
Users that are interested in catena are comparing it to the libraries listed below
- ipcrypt implementation in C☆31Updated 4 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 6 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- Lightweight cryptographic hash functions (reference code)☆16Updated 10 years ago
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- Reference implementations (software)☆85Updated 8 years ago
- A tool to extract code from individual functions in a library.☆15Updated 2 months ago
- C implementation of the BlaBla20 cipher☆9Updated 4 years ago
- some core unix utils with focus on simplicity and ability to build standalone.☆40Updated last year
- axolotl based on libsodium☆22Updated 8 years ago
- salty privacy☆53Updated 4 years ago
- CPGB is the Curve Privacy Guard B, a secure replacement for GPG using ECC.☆24Updated 13 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 9 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Pong revolution.☆13Updated 5 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 6 months ago
- Encrypted, compressed, distributed backups☆26Updated 9 years ago
- A tweakable block cipher☆31Updated 9 months ago
- A fast secure userspace pseudorandom number generator☆82Updated 10 years ago
- Non-C Implementations of the yescrypt KDF.☆29Updated 6 years ago
- BLAKE2 AVX2 implementations☆23Updated 5 years ago
- SipHash AVX2 implementation in C☆15Updated 9 years ago
- Collection of test vectors for cryptographic operations☆11Updated 9 years ago
- Password Hashing Competition Submissions☆71Updated 10 years ago
- CRYPTOGAMS distribution repository☆56Updated 3 months ago
- empirical measurement of code constructs that seem like they should have constant execution time regardless of values of inputs☆9Updated 9 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 7 years ago
- PaX exception daemon - Temporarily abandoned due to the PaX and grsecurity patches becoming private☆41Updated 8 years ago