sbp / tweetnacl-tools
Tools for using TweetNaCl
☆23Updated 7 years ago
Alternatives and similar repositories for tweetnacl-tools:
Users that are interested in tweetnacl-tools are comparing it to the libraries listed below
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆66Updated 3 years ago
- Deterministic execution virtual machine sandbox for Moxie arch☆74Updated 4 years ago
- A public domain constant-time implementation of ChaCha20 on 8-bit AVR microcontroller.☆32Updated 6 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- ELF binary patching utility☆41Updated 9 years ago
- Yet another signify tool☆90Updated 6 months ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆99Updated 7 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆44Updated 9 years ago
- Cryptography library. X25519, Ed25519, qDSA, Elligator2, Ristretto, ChaCha20, Blake2, Poly1305, Scrypt, Noise protocol, File encryption i…☆34Updated 5 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 6 years ago
- ☆37Updated 7 years ago
- A toolset for extending closed-source Linux processes☆9Updated 8 years ago
- Optimized block functions for the ChaCha stream cipher☆49Updated 4 years ago
- an open source toolkit for PCI bus exploration☆70Updated 8 years ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆26Updated 8 years ago
- Fun with the TLS handshake☆31Updated 10 years ago
- SHA-3 implementation for 8-bit AVR☆9Updated 6 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆71Updated 7 years ago
- Abusing U2F to 'store' a stable secret☆17Updated 9 years ago
- Linux userspace Networking Stack☆14Updated 7 years ago
- CRYPTOGAMS distribution repository☆56Updated 2 months ago
- Finalists to the NIST lightweight cryptography competition☆37Updated 2 years ago
- Generator of "nothing-up-my-sleeve" constants☆23Updated 9 years ago
- Reference implementations (software)☆85Updated 8 years ago
- sign elf binaries with GPG☆18Updated 8 years ago
- ☆81Updated 4 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆27Updated 6 years ago