pkt / frelinkLinks
Undelete open files and loop mounts ("improved" version of fdlink)
☆10Updated 14 years ago
Alternatives and similar repositories for frelink
Users that are interested in frelink are comparing it to the libraries listed below
Sorting:
- C version of the MetroHash function☆27Updated 10 years ago
- A fast secure userspace pseudorandom number generator☆83Updated 11 years ago
- AVX-512 utilities☆20Updated 11 years ago
- A deceptively simple way to add a configuration file to a command-line application.☆17Updated 7 months ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- A feature-incomplete peekahole (pahole) clone that doesn't rely on libdwarves (and doesn't choke on Clang output)☆22Updated 7 years ago
- Constant time hex and base64 encode and decode☆21Updated 11 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆47Updated 10 years ago
- Authenticated Blowfish-encrypted pipe☆23Updated 7 years ago
- Parser of C-syntax data definitions, C-syntax function definitions☆19Updated 13 years ago
- Source code for the article "A bug story: data alignment on x86"☆17Updated 8 years ago
- Multiplication using AVX512 and AVX512IFMA instructions☆23Updated 9 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- Turn an interpreter into a code generator☆31Updated 9 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- C++11 library for many-sorted logics☆39Updated 8 years ago
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆36Updated 7 years ago
- A header only Boolean Propagator Network framework for the omni-directional computation of Integer mathematical functions and computation…☆14Updated 7 years ago
- Yet another signify tool☆90Updated last year
- Optimized block functions for the ChaCha stream cipher☆52Updated 5 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 3 years ago
- x86-64 kernel in Rust☆32Updated 8 years ago
- Reference implementations (software)☆85Updated 8 years ago
- A public domain constant-time implementation of ChaCha20 on 8-bit AVR microcontroller.☆34Updated 7 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Updated 10 years ago
- Reference Implementation of Catena, a memory-consuming password scrambler☆31Updated 7 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆70Updated 4 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆17Updated 7 years ago