medsec / catenaLinks
Reference Implementation of Catena, a memory-consuming password scrambler
☆31Updated 7 years ago
Alternatives and similar repositories for catena
Users that are interested in catena are comparing it to the libraries listed below
Sorting:
- SipHash AVX2 implementation in C☆15Updated 9 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- A fast secure userspace pseudorandom number generator☆83Updated 11 years ago
- C implementation of the BlaBla20 cipher☆9Updated 4 years ago
- some core unix utils with focus on simplicity and ability to build standalone.☆41Updated last year
- A golang implementation of Ed448-Goldilocks. This is a mirror of https://bugs.otr.im/otrv4/ed448☆40Updated 2 years ago
- Lazy man's, user-mode union file system☆31Updated 9 years ago
- CPGB is the Curve Privacy Guard B, a secure replacement for GPG using ECC.☆24Updated 13 years ago
- Reference implementations of the GIMLI permutation☆15Updated 8 years ago
- ipcrypt implementation in C☆33Updated 2 months ago
- Yet another signify tool☆90Updated last year
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- Use BIOS ram hacks to make a SSH server out of any INT 10 13h app (MS-DOS is one of those)☆147Updated 9 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 10 years ago
- C library that implements the OTR protocol.☆61Updated 8 years ago
- Encrypted, compressed, distributed backups☆26Updated 9 years ago
- Optimized block functions for the ChaCha stream cipher☆51Updated 5 years ago
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆36Updated 7 years ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆27Updated 9 years ago
- A deceptively simple way to add a configuration file to a command-line application.☆17Updated 4 months ago
- Password Hashing Competition Submissions☆72Updated 11 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆22Updated 8 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆55Updated 7 years ago
- CRYPTOGAMS distribution repository☆59Updated last week
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 2 years ago
- SHA-3 finalist (reference code)☆39Updated 11 years ago
- Source code for the article "A bug story: data alignment on x86"☆16Updated 8 years ago
- Memory Based HardenedBSD System☆11Updated 6 years ago