Balloon Hashing implemented in Python
☆17Nov 21, 2025Updated 4 months ago
Alternatives and similar repositories for balloon-hashing
Users that are interested in balloon-hashing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 9 months ago
- A memory-hard password hashing function.☆71May 29, 2023Updated 2 years ago
- Python bindings for SPHINCS+☆24Sep 27, 2022Updated 3 years ago
- Static file analysis for PE files☆13Dec 4, 2020Updated 5 years ago
- Docker image for accessing EDavki☆14Feb 4, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Plain C implementation of ProgPoW☆13Dec 30, 2021Updated 4 years ago
- ☆11Jan 24, 2019Updated 7 years ago
- Deletes a file that is currently in use by another process.☆13Oct 12, 2021Updated 4 years ago
- LIGHTER-R is a tool to optimally implement a given 4 × 4 SBox using logic gates from a reversible logic library☆13Oct 6, 2025Updated 5 months ago
- Code for FSE 2020 - Improving the MILP-based Security Evaluation Algorithm against Differential-Linear Cryptanalysis Using A Divide-and-C…☆16Dec 16, 2019Updated 6 years ago
- Standalone Java reference implementation of Diffie Hellman☆22Sep 7, 2016Updated 9 years ago
- Obfuscated Tiny C Compiler☆16Oct 24, 2014Updated 11 years ago
- Argon2 key derivation for Ruby☆11Updated this week
- An attempt to port lossyWAV to POSIX.☆17May 21, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Template I use for my Visual C++ projects.☆12Aug 28, 2019Updated 6 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆33Jan 17, 2022Updated 4 years ago
- Reference Implementation of Catena, a memory-consuming password scrambler☆32Mar 26, 2018Updated 8 years ago
- Speaker Workshop is an application for testing speaker drivers using a Windows sound card, then designing and simulating loudspeakers and…☆24Jan 14, 2019Updated 7 years ago
- A simple adaboost code using decision stumps as weak classifiers☆11Nov 1, 2012Updated 13 years ago
- QSapecNG☆14Jun 7, 2021Updated 4 years ago
- A cryptographic hash function faster than MD5, SHA-1, SHA-2, and SHA-3☆13Feb 14, 2022Updated 4 years ago
- Swift bindings for libscrypt☆15Mar 21, 2024Updated 2 years ago
- Command-line client for generating Mobile-OTP / mOTP codes☆11Apr 15, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Python implementations of some algorithms from the CLRS textbook☆10Dec 8, 2019Updated 6 years ago
- Summary and archive of Vatican .va (Holy See) ccTLD zone data for researchers.☆13Apr 26, 2023Updated 2 years ago
- FPGA state machine for minimalistic USB HID device hosting☆15Aug 27, 2022Updated 3 years ago
- This tool is able to construct the MILP model for some bit-oriented block ciphers. once you describe the block-cipher on it, you can do d…☆17Jul 18, 2019Updated 6 years ago
- A ruby gem for creating secure passphrases using EFF's long wordlist.☆11Apr 20, 2018Updated 7 years ago
- Python tools to automate processing a batch of OverDrive audiobooks.☆10Nov 26, 2022Updated 3 years ago
- List of Student Rocket Projects that are accepting dontations☆15Oct 7, 2022Updated 3 years ago
- Clone of gettext envsubst for e.g. Mac where it is not available☆11Dec 15, 2023Updated 2 years ago
- A Typst-template for simple reports☆20Mar 20, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An index of blocklists and a tool to extract CIDRs to use in firewalls and network appliances.☆12Aug 3, 2023Updated 2 years ago
- A retro dark theme for Hugo☆15Feb 8, 2019Updated 7 years ago
- Code repo for https://benhoyt.com/writings/io-is-no-longer-the-bottleneck/☆14Nov 26, 2022Updated 3 years ago
- ☆10Dec 26, 2022Updated 3 years ago
- Links to various open-source Keebio repositories, like PCB designs, case files, and keyboard design tools/libraries☆15Feb 13, 2023Updated 3 years ago
- SPICE netlists parser for .NET☆32Updated this week
- Community operated machine-readable domain-name blacklist☆12Sep 8, 2023Updated 2 years ago