#
hash-algorithm
Here are 55 public repositories matching this topic...
Software to identify the different types of hashes used to encrypt data and especially passwords
-
Updated
Jun 4, 2020 - Python
Coursera's Data Structures and Algorithms Specialization
algorithm
graph-algorithms
priority-queue
data-structures
binary-search-tree
sorting-algorithms
heap
tree-structure
search-algorithm
dynamic-programming
shortest-paths
hash-algorithm
heuristics
minimum-spanning-trees
greedy-algorithm
hash-tables
string-algorithms
efficient-algorithm
amortized-array
disjoint
-
Updated
Aug 15, 2019 - Python
Security-oriented protobuf-like serialization format with "Merkleized" content hashing support
-
Updated
Aug 17, 2020 - Rust
multihash implementation in Rust
-
Updated
Aug 5, 2020 - Rust
ntHash: recursive nucleotide hashing
-
Updated
Aug 14, 2020 - C++
-
Updated
Jun 14, 2020 - Elixir
macOS workflow and shell script to calculate or automatically verify checksums for files or folder contents
macos
workflow
services
torrent
bittorrent
service
checksum
finder
hash-functions
hash
digest
shell-script
sfv
finder-macro
hash-algorithm
checksum-digests
checksums
-
Updated
Feb 14, 2017 - Shell
Checksum calculation extensions for Swift
-
Updated
Jul 7, 2020 - Swift
Fast JavaScript implementation of bCrypt
-
Updated
Jul 5, 2017 - JavaScript
Java Cryptographic, Encoding and Hash Utilities
java
cryptography
encryption
hash-functions
hash
digest
hash-algorithm
decryption
java-cryptography
java-crypto
java-crypto-utils
-
Updated
Mar 17, 2019 - Java
ntHash implementation in Rust
-
Updated
May 25, 2020 - Rust
simple extension methods which make working with cryptography easier
-
Updated
Mar 22, 2020 - C#
[READ ONLY] Openssl and libsodium encryption and password hashing adapters for PHP.
algorithm
crypto
aes
password-generator
password
ciphers
libsodium
password-hash
blowfish
crypto-library
hash-algorithm
openssl-extension
php-openssl
-
Updated
Aug 7, 2020 - PHP
Some of the more common uses of hash functions.
-
Updated
Sep 5, 2017 - C++
A lightweight generator for short, unique, non-sequential and decodable Hashids from non-negative numbers.
-
Updated
Jan 11, 2018 - Java
BELT (STB 34.101.31) Encryption Algorithm and Hash Function Implementations
-
Updated
Apr 13, 2019 - C
512-bit block encryption algorithm, specially for x64
security
hash
purge
hash-checksum
crypto-library
hash-algorithm
ray
pray
encryption-algorithm
evasion
security-tools
-
Updated
Oct 4, 2016 - C
A portable C library providing the BLAKE2s hashing function
-
Updated
Jul 12, 2017 - C
A visual "hashing" algorithm written in JavaScript, mostly for client-side use.
-
Updated
Jun 7, 2019 - HTML
Ruby Implementation of the FNV (Fowler-Noll-Vo) Non-Cryptographic Hash Algorithms
-
Updated
May 17, 2017 - Ruby
Rapidly generate key pair hex/hash values
java
hashing
security
cryptography
hash
cybersecurity
sha-256
sha-512
sha1
hash-algorithm
hash-collision
hash-generator
-
Updated
Sep 6, 2017 - Java
A simple checksum viewer made in Python!
-
Updated
Mar 31, 2017 - Python
Butcher for progressive password storage
-
Updated
Jun 1, 2020 - Go
UDFs and SPs for DB2 to generate and validate hashes
-
Updated
Jan 8, 2019 - C
Generate checksums for for Keccak-based algorithms, such as SHA-3.
-
Updated
Feb 8, 2020 - Ada
Improve this page
Add a description, image, and links to the hash-algorithm topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the hash-algorithm topic, visit your repo's landing page and select "manage topics."
Issue #30 identified an issue in SpookyHash that ultimately was not caught because the test vectors that were originally defined for the SpookyHash implementation were just plain wrong.
The obvious follow up is: did I screw up any other test vectors and therefore implementations?