#
cryptographic-hash-functions
Here are 32 public repositories matching this topic...
Hashing functions and PRNGs based on them
-
Updated
Mar 22, 2021 - C
Cross-platform cryptographic functions in swift
javascript
macos
swift
ios
cryptography
crypto
aes
osx
openssl
cryptojs
cryptographic-hash-functions
-
Updated
Jan 10, 2019 - Swift
Elegant Swift interface to access the CommonCrypto routines
-
Updated
Apr 7, 2020 - Swift
Framework for studying cryptographic hash functions using SAT.
cryptography
distributed-computing
siphash
md5
cryptographic-hash-functions
md4
sha3
sat
satisfiability
-
Updated
Dec 21, 2021 - Python
A cryptographic hash function faster than MD5, SHA-1, SHA-2, and SHA-3
-
Updated
May 30, 2018 - Ruby
Solutions to programming assignments of Stanford Cryptography I (Coursera)
otp
aes
authentication
sha-256
padding-oracle-attacks
cryptographic-hash-functions
authenticated-encryption
meet-in-the-middle
block-ciphers
discrete-logarithm
symmetric-key-cryptography
public-key-encryption
cryptography-stanford
-
Updated
Jun 2, 2021 - Python
a free, cross platform, feature-rich tool/lib to compute, verify, and handle data fingerprints; 471 fingerprinting algorithms; multi-core and Unicode support; recursive integrity checks; predefined and customizable output; CLI, API, and accessible at your file browser. Jacksum is all about checksums, CRCs, hashes, message digests, fingerprints.
java
hashing
multi-platform
multi-threading
reverse-engineering
md5
crc
integrity
sha256
cryptographic-hash-functions
checksums
sha3
sm3
crc-model
jacksum
non-cryptographic-hash-functions
integrity-checker
message-digest-algorithm
blake3
crc-finder
-
Updated
Jan 5, 2022 - Java
Optimized Collision Search for STARK-Friendly Hash Challenge Candidates
-
Updated
Feb 2, 2020 - C
CHMk-1-2048 Reference Implementation
cryptography
sha2
cryptography-library
whirlpool
crypto-library
cryptographic-hash-functions
streebog
sha3
sha512
cryptographic-hashing-algorithms
cryptographic-hash
cryptographic-algorithms
cryptographic-hashes
sha3-512
gost3411-2012
chymos
chmk-1-2048
streebog-512
cryptographic-cores
cryptographic-core
-
Updated
Apr 13, 2017 - C
SHA-512 hardware implementation in VHDL. Based on NIST FIPS 180-4.
-
Updated
Dec 11, 2019 - VHDL
Stupid Algorithm for Password Hashing (WebCrypto)
javascript
cryptography
typescript
crypto
javascript-library
es2017
cryptographic-hash-functions
webcrypto
cryptographic-hash
cryptographic-algorithms
cryptography-algorithms
cryptographic-library
-
Updated
Jun 9, 2021 - TypeScript
Chymos, a "first-order" homogenization Key-Expansion template
cryptography
article
paper
cryptographic-hash-functions
cryptographic-algorithms
cryptographic-hashes
chymos
chmk-1-2048
cryptographic-cores
cryptographic-core
algorithm-space
-
Updated
Apr 14, 2017
The LV Hash Algorithm - my own cryptographic hashing algorithm
hashing
security
cryptography
algorithm
crypto
hash
a
cryptographic
implementation
cryptographic-hash-functions
cryptographic-hashing-algorithms
-
Updated
Mar 29, 2020 - C
Binary overlay classes for message digests.
java
hash-functions
multihash
bouncy-castle
message-digest
cryptographic-hash-functions
multiformats
bouncycastle
-
Updated
Jul 16, 2017 - Java
Stupid Algorithm for Password Hashing (Python implementation)
python
cryptography
crypto
python-library
python3
cryptographic-hash-functions
cryptographic-hash
cryptographic-algorithms
cryptography-algorithms
cryptographic-library
-
Updated
May 19, 2020 - Python
File System Integrity - Operating Systems
-
Updated
Aug 14, 2019 - C
Implementation of the SHA-256 cryptographic hash algorithm.
-
Updated
Jan 1, 2018 - C++
Hashing library for .NET
hashing
library
csharp
hash-functions
hashing-library
cryptographic-hash-functions
hashing-algorithms
csharp-library
non-cryptographic-hash-functions
-
Updated
Sep 24, 2018
Vectorized, Accelerated Rescue Prime Hash Function Implementation, using OpenCL
-
Updated
Dec 9, 2021 - C
The goal of this assignment is to get familiar with Linux file system APIs.We are to implement a secure library (SecureFS) on top of the existing file system interfaces that raises the alarm if, the integrity of the files created through the secure library APIs is compromised. We need to check the consistency of file blocks before every read and write.
-
Updated
May 6, 2019 - C
A website for encryption/decryption of text. Final project for CS50x 2014
-
Updated
Dec 2, 2020 - JavaScript
SipHash Headers Only C ++ Library
-
Updated
Oct 9, 2021 - C++
A Go implementation of SM3 cryptographic hash algorithm.
-
Updated
Feb 20, 2020 - Go
Hash functions optimized for binary trees.
-
Updated
Jul 11, 2021 - JavaScript
A simple checksum/cryptographic hash calculator.
-
Updated
Jul 3, 2021 - C#
Stupid Algorithm for Password Hashing (Java implementation)
java
cryptography
crypto
java-library
cryptographic-hash-functions
cryptographic-hash
cryptographic-algorithms
cryptography-algorithms
cryptographic-library
-
Updated
May 19, 2020 - Java
Improve this page
Add a description, image, and links to the cryptographic-hash-functions topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the cryptographic-hash-functions topic, visit your repo's landing page and select "manage topics."
objectWriter.jsx, _setKeys(), this.premisRightsHandler.setId() causes the exception above if no rights have been selected. Needs invistigating....