medsec / catenaLinks
Reference Implementation of Catena, a memory-consuming password scrambler
☆32Updated 7 years ago
Alternatives and similar repositories for catena
Users that are interested in catena are comparing it to the libraries listed below
Sorting:
- C implementation of the BlaBla20 cipher☆10Updated last month
- Lazy man's, user-mode union file system☆31Updated 10 years ago
- some core unix utils with focus on simplicity and ability to build standalone.☆41Updated 2 years ago
- Yet another signify tool☆92Updated last year
- AVX2 Chacha implementation☆16Updated 12 years ago
- A fast secure userspace pseudorandom number generator☆83Updated 11 years ago
- SHA-3 finalist (reference code)☆41Updated 11 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Updated 8 years ago
- PaX exception daemon - Temporarily abandoned due to the PaX and grsecurity patches becoming private☆40Updated 9 years ago
- Password Hashing Competition Submissions☆72Updated 11 years ago
- A public domain constant-time implementation of ChaCha20 on 8-bit AVR microcontroller.☆35Updated 7 years ago
- A deceptively simple way to add a configuration file to a command-line application.☆17Updated 11 months ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆28Updated last month
- Reference implementations (software)☆85Updated 9 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Optimized block functions for the ChaCha stream cipher☆52Updated 6 years ago
- an experimental distribution based on musl libc and busybox☆11Updated 8 years ago
- Use at your own risk.☆19Updated 4 years ago
- Cymric - Portable secure random number generator☆21Updated 11 years ago
- Cryptographic signing, ported from BSD for Linux, that uses instructions of modern CPUs☆24Updated 5 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆70Updated 4 years ago
- a "small is beautiful" tool for UNIX privilege escalation☆59Updated 5 years ago
- A Camouflage Proxy for the Tor Anonymity System☆88Updated 10 years ago
- A small suite of scripts and patches for building musl libc cross compilers.☆35Updated 10 years ago
- A readline C and C++ REPL with history, tab-completion, and undo.☆29Updated 2 months ago
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆36Updated 8 years ago
- Optimized, portable implementations of BLAKE2b☆25Updated 10 years ago
- picotrace - system call process tracer☆39Updated 5 years ago
- salty privacy☆52Updated 5 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 11 years ago