nachonavarro / balloon-hashingLinks
Balloon Hashing implemented in Python
☆15Updated last year
Alternatives and similar repositories for balloon-hashing
Users that are interested in balloon-hashing are comparing it to the libraries listed below
Sorting:
- A memory-hard password hashing function.☆70Updated 2 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated last month
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated 11 months ago
- The wolfSSL Command Line Utility wolfCLU☆19Updated last week
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆17Updated 4 months ago
- Jitterentropy Library☆118Updated 2 weeks ago
- Pufferfish2 password hashing scheme☆59Updated last year
- Jitterentropy RNGd☆98Updated last month
- Sphinx-based Password Storage low-level library☆130Updated 6 months ago
- FPE - Format Preserving Encryption with FF3 in C☆14Updated last month
- Optimized version of the reference implementation of Ed25519☆36Updated last year
- USB armory - boot loader☆37Updated 4 months ago
- rvault: secure and authenticated store for secrets and small documents☆37Updated 2 years ago
- Implementations of a fast Message-Authentication Code☆120Updated 2 years ago
- Fast constant-time AES implementations on 32-bit architectures☆65Updated 9 months ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆26Updated 4 years ago
- The BLAKE3 paper: specifications, analysis, and design rationale☆180Updated 3 years ago
- A cache hard password hash/KDF☆47Updated last year
- DIY FIDO2 U2F token☆41Updated last year
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- General number field sieve for python☆18Updated 10 years ago
- Communicate with Nitrokey devices in a clean and easy manner☆65Updated last year
- Oblivious DoH library☆17Updated 3 years ago
- Haraka is a secure and efficient short-input hash function.☆57Updated 7 years ago
- C library providing BLAKE2b, BLAKE2s, BLAKE2bp, BLAKE2sp☆134Updated 2 years ago
- ☆23Updated 3 years ago
- Non-C Implementations of the yescrypt KDF.☆29Updated 6 years ago
- Noise Protocol Framework - Python 3 implementation☆210Updated 2 years ago
- Cryptographic signing, ported from BSD for Linux, that uses instructions of modern CPUs☆24Updated 4 years ago
- Oblivious HTTP implementation☆31Updated last year