mysto / clang-fpeLinks
FPE - Format Preserving Encryption with FF3 in C
☆14Updated this week
Alternatives and similar repositories for clang-fpe
Users that are interested in clang-fpe are comparing it to the libraries listed below
Sorting:
- A tiny, portable implementation of the IPCrypt specification in C.☆32Updated 2 weeks ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 3 weeks ago
- AEGIS-256☆11Updated 3 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 7 months ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated 4 months ago
- Methods for IP Address Encryption and Obfuscation.☆31Updated 3 weeks ago
- ☆25Updated 8 months ago
- A collection of high-performance crypto implementations.☆52Updated 2 months ago
- A DNS library for Rust.☆23Updated 9 months ago
- ☆36Updated last year
- An idiomatic C++ wrapper for the Monocypher crypto library☆12Updated last year
- A cache hard password hash/KDF☆49Updated last year
- sign elf binaries with GPG☆17Updated 9 years ago
- EME (Encrypt-Mix-Encrypt) wide-block encryption for Go.☆51Updated this week
- ☆12Updated 5 years ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆38Updated last year
- A crate for reading, parsing, verifying, and generating OpenSSH certificates and keys.☆17Updated 5 months ago
- A quick benchmark of {Open,Libre,Boring}SSL☆27Updated 3 years ago
- Oblivious HTTP implementation☆32Updated last year
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆18Updated 10 months ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆14Updated 10 months ago
- A tweakable block cipher☆31Updated last year
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆18Updated 3 weeks ago
- DNS proxy for enabling any application to use DNS Over HTTPS/DNS Over TLS/DNSCrypt☆22Updated 4 years ago
- BAT KEM/Signature Reference Implementation☆23Updated 4 years ago
- Sample of standalone portable C to verify Ed25519 public-key signature☆20Updated 9 years ago
- IPv4 to IPv6 interceptor☆68Updated 2 years ago
- Example Trussed app, implementing OATH TOTP, running on PC.☆23Updated 4 years ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago