patrickfav / singlestep-kdfLinks
Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages digest and HMAC.
☆10Updated 2 years ago
Alternatives and similar repositories for singlestep-kdf
Users that are interested in singlestep-kdf are comparing it to the libraries listed below
Sorting:
- Java implementation of FIPS 202, SHA3-xxxx, SHAKE128, SHAKE256☆18Updated 4 years ago
- A Java port of TweetNaCl from the original C☆22Updated 4 months ago
- A blake2s java implementation☆19Updated 9 years ago
- ChaCha20 + Poly1305☆23Updated 9 years ago
- A standalone Java 7 implementation of HMAC-based key derivation function (HKDF) defined in RFC 5869 first described by Hugo Krawczyk. HKD…☆67Updated last year
- Serpent Cipher implementation for Cryptography course.☆9Updated 12 years ago
- Updated NestedVM toolchain for compiling C/C++ applications to run on the JVM☆32Updated last year
- Java implementation of Keccak and SHA-3 hash functions.☆14Updated 2 years ago
- A Java library for working with Ascii85, also called Base85 - a form of binary-to-text encoding☆17Updated 4 years ago
- libsodium-jna is a java library that binds to libsodium C crypto APIs with Java Native Access (JNA)☆51Updated 10 months ago
- A Java implementation of AES-GCM-SIV (RFC 8452).☆33Updated 6 years ago
- Pure Java implementation of curve25519, salsa20, hsalsa20, xsalsa20 and poly1305 cryptographic primitives, along with a NaCl "Box" implem…☆110Updated last year
- Cymric - Portable secure random number generator☆21Updated 11 years ago
- SHA-3 implementation for 8-bit AVR☆9Updated 6 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated last week
- RFC 5297 SIV mode of operation in Java☆43Updated last week
- A pure Java implementation of XSalsa20Poly1305 authenticated encryption.☆32Updated 6 years ago
- An experimental project to customize squawk virtual machine for microcontrollers. Users can write embedded application programs in Java …☆57Updated 6 years ago
- Java implementation of age encryption☆30Updated last month
- Optimized (fast) Java Keccak/SHA3/SHAKED implementation☆13Updated 4 years ago
- FPE - Format Preserving Encryption with FF3 in C☆13Updated 2 weeks ago
- O(1) Cryptography is an easy to use, hard to misuse Java cryptographic library based on O(1) cryptographic algorithms☆16Updated 2 years ago
- A pure-Java implementation of the NaCl cryptography library☆29Updated 2 years ago
- Java virtual machine implementation that converts class files into C source files (HISTORICAL)☆16Updated 10 years ago
- Plain Java implementation of the Noise protocol☆133Updated last year
- Java implementation of the authenticated encryption algorithm Ascon☆17Updated last year
- My best Java class to compress any String, short or long, with any character of human history☆10Updated 7 years ago
- The Micro Java Virtual Machine Kernel is a portable preemptive real-time kernel with an integrated CLDC Java virtual machine designed for…☆36Updated 4 years ago
- AEGIS-256☆10Updated 3 years ago
- A Skein and Threefish software suite for C, Java, and Go☆69Updated 9 years ago