sbp / tweetnacl-toolsLinks
Tools for using TweetNaCl
☆26Updated 8 years ago
Alternatives and similar repositories for tweetnacl-tools
Users that are interested in tweetnacl-tools are comparing it to the libraries listed below
Sorting:
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆70Updated 4 years ago
- A really tiny crypto library.☆161Updated 6 months ago
- A public domain constant-time implementation of ChaCha20 on 8-bit AVR microcontroller.☆34Updated 7 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- An implementation of the Salsa20 stream cipher in C99☆116Updated 9 years ago
- ELF binary patching utility☆41Updated 9 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆17Updated 7 years ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆102Updated 8 years ago
- Qtum's x86 VM☆57Updated 6 years ago
- an open source toolkit for PCI bus exploration☆72Updated 8 years ago
- Yet another signify tool☆90Updated last year
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- ☆30Updated 3 years ago
- ☆33Updated last year
- A fast secure userspace pseudorandom number generator☆83Updated 11 years ago
- Xoocycle, a C90 implementation of the Xoodyak hash and AEAD construction☆10Updated 6 years ago
- ☆37Updated 8 years ago
- Implementations of a fast Message-Authentication Code☆120Updated 3 years ago
- ikgt manifest☆42Updated 3 years ago
- Haraka is a secure and efficient short-input hash function.☆58Updated 8 years ago
- ☆82Updated 5 years ago
- sign elf binaries with GPG☆17Updated 9 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- Sample of standalone portable C to verify Ed25519 public-key signature☆20Updated 9 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 8 months ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆339Updated 3 years ago
- AES-GCM-SIV implementations (128 and 256 bit)☆116Updated 6 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆47Updated 10 years ago
- Optimized block functions for the ChaCha stream cipher☆52Updated 5 years ago
- USB armory - boot loader☆37Updated this week