medsec / catenaLinks
Reference Implementation of Catena, a memory-consuming password scrambler
☆31Updated 7 years ago
Alternatives and similar repositories for catena
Users that are interested in catena are comparing it to the libraries listed below
Sorting:
- ipcrypt implementation in C☆32Updated last month
- AVX2 Chacha implementation☆16Updated 11 years ago
- C implementation of the BlaBla20 cipher☆9Updated 4 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- Encrypted, compressed, distributed backups☆26Updated 9 years ago
- Reference implementations (software)☆85Updated 8 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- salty privacy☆52Updated 4 years ago
- A public domain constant-time implementation of ChaCha20 on 8-bit AVR microcontroller.☆32Updated 6 years ago
- Pong revolution.☆13Updated 5 years ago
- A tool to extract code from individual functions in a library.☆16Updated 5 months ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- A fast secure userspace pseudorandom number generator☆82Updated 10 years ago
- axolotl based on libsodium☆22Updated 8 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- Password Hashing Competition Submissions☆72Updated 11 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- CPGB is the Curve Privacy Guard B, a secure replacement for GPG using ECC.☆24Updated 13 years ago
- Lightweight cryptographic hash functions (reference code)☆16Updated 11 years ago
- .onion discovery via SRV DNS lookups for use with postfix☆14Updated last year
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- i2p c++ implementation☆19Updated 10 years ago
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- A high-security scalable solution for online backups.☆45Updated 10 years ago
- SHA-3 finalist (reference code)☆39Updated 11 years ago
- A pure-go implementation of the Axolotl Ratchet, extracted from pond☆21Updated 8 years ago
- Plug-and-play IP rate limiter in C☆24Updated 4 years ago
- Yet another signify tool☆90Updated 11 months ago
- Lazy man's, user-mode union file system☆31Updated 9 years ago
- An apt transport method enabling i2p using the SAM bridge.☆19Updated 3 weeks ago