sbp / tweetnacl-tools
Tools for using TweetNaCl
☆24Updated 7 years ago
Alternatives and similar repositories for tweetnacl-tools:
Users that are interested in tweetnacl-tools are comparing it to the libraries listed below
- Deterministic execution virtual machine sandbox for Moxie arch☆74Updated 4 years ago
- ☆37Updated 8 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆45Updated 10 years ago
- A public domain constant-time implementation of ChaCha20 on 8-bit AVR microcontroller.☆32Updated 6 years ago
- DWARF explorer☆14Updated 9 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 7 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆67Updated 3 years ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆27Updated 9 years ago
- ELF binary patching utility☆41Updated 9 years ago
- Minimal AES-128 encryption. Suitable for small embedded systems. Including an on-the-fly key schedule variant for minimal RAM usage.☆69Updated 2 years ago
- some core unix utils with focus on simplicity and ability to build standalone.☆40Updated last year
- Generator of "nothing-up-my-sleeve" constants☆24Updated 9 years ago
- Optimized block functions for the ChaCha stream cipher☆50Updated 5 years ago
- Lightweight cryptographic hash functions (reference code)☆16Updated 10 years ago
- ☆81Updated 5 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- ikgt manifest☆42Updated 2 years ago
- Thumb instruction set emulator☆114Updated 3 years ago
- tiny, self-contained C compiler using TCC + uClibc☆21Updated 10 months ago
- Authenticated Blowfish-encrypted pipe☆23Updated 7 years ago
- Experiments in high-assurance crypto.☆47Updated 2 years ago
- Yet another signify tool☆90Updated 10 months ago
- Highly efficient implementation of elliptic curve 25519☆153Updated 2 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 8 years ago
- Umeq is an equivalent of qemu user mode emulation with improved robustness☆22Updated 6 years ago
- AES-GCM-SIV implementations (128 and 256 bit)☆114Updated 5 years ago
- an open source toolkit for PCI bus exploration☆70Updated 8 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- A x86 Virtual Machine Monitor including device modules and instruction emulator. Standalone version of the Vancouver VMM.☆43Updated 3 years ago