sbp / tweetnacl-tools
Tools for using TweetNaCl
☆23Updated 7 years ago
Alternatives and similar repositories for tweetnacl-tools:
Users that are interested in tweetnacl-tools are comparing it to the libraries listed below
- Yet another signify tool☆90Updated 8 months ago
- A public domain constant-time implementation of ChaCha20 on 8-bit AVR microcontroller.☆32Updated 6 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆66Updated 3 years ago
- Deterministic execution virtual machine sandbox for Moxie arch☆74Updated 4 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 6 years ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆27Updated 9 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated last week
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆102Updated 4 years ago
- ELF binary patching utility☆41Updated 9 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆44Updated 10 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 8 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- Trust Zone Project☆21Updated 10 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 6 years ago
- Implementations of a fast Message-Authentication Code☆114Updated 2 years ago
- Wrapper of the OpenSSL elliptic curve functions for easy Python manipulation☆12Updated 10 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- Cryptography library. X25519, Ed25519, qDSA, Elligator2, Ristretto, ChaCha20, Blake2, Poly1305, Scrypt, Noise protocol, File encryption i…☆34Updated 5 years ago
- opmsg p2p transport network☆71Updated 6 years ago
- sign elf binaries with GPG☆18Updated 8 years ago
- SHA-3 implementation for 8-bit AVR☆9Updated 6 years ago
- Optimized block functions for the ChaCha stream cipher☆49Updated 5 years ago
- Lightweight cryptographic hash functions (reference code)☆16Updated 10 years ago
- "What if I tossed small pox into a room filled with sprinters after filling their water cups with red bull."☆33Updated 9 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 9 years ago
- An RFC5297-compliant C implementation of AES-SIV☆19Updated 4 years ago
- ikgt manifest☆42Updated 2 years ago
- ☆37Updated 7 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆71Updated 7 years ago
- axolotl based on libsodium☆22Updated 8 years ago