medsec / catena
Reference Implementation of Catena, a memory-consuming password scrambler
☆31Updated 6 years ago
Alternatives and similar repositories for catena:
Users that are interested in catena are comparing it to the libraries listed below
- ipcrypt implementation in C☆30Updated 4 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆27Updated 6 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- C implementation of the BlaBla20 cipher☆9Updated 4 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 8 years ago
- salty privacy☆53Updated 4 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆28Updated 5 months ago
- Mirror of freehaven's anonymous research bibliography☆13Updated 9 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 7 years ago
- Reference implementations (software)☆85Updated 8 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆22Updated 8 years ago
- Pong revolution.☆13Updated 5 years ago
- Non-C Implementations of the yescrypt KDF.☆29Updated 6 years ago
- ipcipher is a specification for encrypting IP{v4,v6} addresses 'in place'.☆19Updated 6 years ago
- i2p c++ implementation☆19Updated 9 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 10 years ago
- A fast secure userspace pseudorandom number generator☆82Updated 10 years ago
- A tweakable block cipher☆30Updated 8 months ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆32Updated 9 years ago
- Lightweight cryptographic hash functions (reference code)☆15Updated 10 years ago
- empirical measurement of code constructs that seem like they should have constant execution time regardless of values of inputs☆9Updated 9 years ago
- axolotl based on libsodium☆22Updated 8 years ago
- mozilla: Firefox's X.509 certificate verification core code.☆22Updated 9 years ago
- A DNS library for Rust.☆23Updated 2 weeks ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆24Updated 4 years ago
- A tool to extract code from individual functions in a library.☆15Updated last month
- Reference implementations of the GIMLI permutation☆13Updated 7 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆74Updated 7 years ago
- CPGB is the Curve Privacy Guard B, a secure replacement for GPG using ECC.☆24Updated 13 years ago
- Towards an IETF RFC for XChaCha20-Poly1305☆28Updated 5 years ago