outspace / dstu8845Links
Implementation of Strumok stream cipher
☆18Updated 3 years ago
Alternatives and similar repositories for dstu8845
Users that are interested in dstu8845 are comparing it to the libraries listed below
Sorting:
- Reference implementation of the Kalyna block cipher (DSTU 7624:2014), all block and key length variants☆35Updated 4 years ago
- Private Mode eXecution for Windows on Python☆24Updated 4 years ago
- A tiny, portable implementation of the IPCrypt specification in C.☆26Updated 2 weeks ago
- HOOGMOON — Remote Access OS for Internet Censorship Research☆34Updated 9 months ago
- Little library for assembly language (fasm, x86-64, linux).☆42Updated 2 years ago
- TereStun — STUN over Teredo☆14Updated 2 years ago
- [Deprecated: use userver-create-service instead!] Template of a C++ service that uses userver framework with gRPC and PostgreSQL. Build, …☆21Updated 2 months ago
- Fast, efficient, header-only C++ Telegram bot API library using polling or FastCGI.☆130Updated 2 years ago
- Speck Block Cipher Implementation☆15Updated 9 years ago
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆20Updated 2 years ago
- Linux shared object injector written in pure C☆49Updated 4 months ago
- JIT-ускоритель программ на языке Python☆33Updated 3 years ago
- TLS client/server framework mimics OpenSSL to SSP interface☆29Updated last month
- ☆46Updated 3 years ago
- GSM base stations for calling everyone around☆92Updated 3 years ago
- ☆44Updated 6 years ago
- 2048 written in x64 assembly for educational purposes (OS: Windows)☆18Updated 3 years ago
- Бібліотека криптографічних перетворень☆52Updated 8 months ago
- Примеры элементов фронтенда и бекенда компилятора на C++, Lemon и LLVM☆10Updated 8 years ago
- ☆27Updated 3 weeks ago
- POSIX command line utilities, from scratch☆24Updated last year
- В этом репозитории находятся все примеры, рассмотренные в книге «Фундаментальные основы хакерства. Анализ программ в среде Win64»☆27Updated 2 years ago
- simple processor circuit suitable for repeating in transistors☆42Updated last year
- Elbrus 2000 (e2k) backend to LCC (Little C Compiler)☆21Updated 3 years ago
- Secure TLS tunnel with pool of prepared upstream connections☆101Updated 2 weeks ago
- 🛡️ Anonymous F2F network based on the QB-problem & GP/12 protocol stack. Uses post-quantum cryptographic algorithms: ML-KEM, ML-DSA☆158Updated last week
- Fast block cipher implementations (x86-64) in counter-mode for the SUPERCOP cryptographic benchmarking framework. Artifacts of implementa…☆11Updated 6 years ago
- Window User Interface Library :: libWUI offical repo☆40Updated this week
- Деобфускатор результатов выборов 2021☆34Updated 4 years ago
- A minimalist implementation of AES algorithms in C☆58Updated 2 weeks ago