nmathewson / libottery
A fast secure userspace pseudorandom number generator
☆82Updated 10 years ago
Alternatives and similar repositories for libottery:
Users that are interested in libottery are comparing it to the libraries listed below
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 6 years ago
- empirical measurement of code constructs that seem like they should have constant execution time regardless of values of inputs☆9Updated 9 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 7 years ago
- Optimized block functions for the ChaCha stream cipher☆49Updated 5 years ago
- TLS in Rust (eventually)☆21Updated 11 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆44Updated 10 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- A small C helper library for storing sets of IPv4 and IPv6 addresses☆10Updated 2 years ago
- Control and diagnostic applications for rump kernels☆36Updated 7 years ago
- C version of the MetroHash function☆25Updated 9 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Tools for testing C compilers for the correct handling of volatile objects.☆26Updated 10 years ago
- ☆22Updated 2 years ago
- experimental high performance, low fragmentation memory allocator☆58Updated 8 years ago
- x86-64 kernel in Rust☆31Updated 8 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- cut out a small (binary) piece of a (binary) file☆15Updated 13 years ago
- Generator of "nothing-up-my-sleeve" constants☆23Updated 9 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- Reference implementations (software)☆85Updated 8 years ago
- Integer arithmetic with overflow detection☆71Updated 10 years ago
- NetBSD cdb (constant database) library☆14Updated 5 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 9 years ago
- A tiny Unix dynamic memory allocator library.☆64Updated 7 years ago
- An exercise in cryptographic minimlism☆24Updated 10 years ago
- DWARF explorer☆14Updated 9 years ago
- Plug-and-play IP rate limiter in C☆24Updated 4 years ago
- mirror of djb's "NaCl: Networking and Cryptography library"☆49Updated 13 years ago