medsec / catena
Reference Implementation of Catena, a memory-consuming password scrambler
☆31Updated 7 years ago
Alternatives and similar repositories for catena:
Users that are interested in catena are comparing it to the libraries listed below
- AVX2 Chacha implementation☆16Updated 11 years ago
- C implementation of the BlaBla20 cipher☆9Updated 4 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- ipcrypt implementation in C☆31Updated last week
- A tool to extract code from individual functions in a library.☆16Updated 4 months ago
- empirical measurement of code constructs that seem like they should have constant execution time regardless of values of inputs☆9Updated 9 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- A fast secure userspace pseudorandom number generator☆82Updated 10 years ago
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 10 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Encrypted, compressed, distributed backups☆26Updated 9 years ago
- A library that allows processes to waive their rights☆27Updated 9 years ago
- axolotl based on libsodium☆22Updated 8 years ago
- Regenerable ed25519 keys for OpenSSH and OpenPGP.☆36Updated 5 years ago
- A deceptively simple way to add a configuration file to a command-line application.☆16Updated last month
- some core unix utils with focus on simplicity and ability to build standalone.☆40Updated last year
- Pong revolution.☆13Updated 5 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- CPGB is the Curve Privacy Guard B, a secure replacement for GPG using ECC.☆24Updated 13 years ago
- Lightweight cryptographic hash functions (reference code)☆16Updated 10 years ago
- C library that implements the OTR protocol.☆61Updated 8 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆45Updated 10 years ago
- i2p c++ implementation☆19Updated 10 years ago
- SipHash AVX2 implementation in C☆15Updated 9 years ago
- Reference implementations (software)☆85Updated 8 years ago
- Password Hashing Competition Submissions☆72Updated 11 years ago
- salty privacy☆52Updated 4 years ago