Implementation and round-reduced preimage attacks on BLAKE-256 hash function.
-
Updated
Mar 17, 2023 - C
Implementation and round-reduced preimage attacks on BLAKE-256 hash function.
Implementation and round-reduced preimage attacks on BLAKE2s hash function.
Web application securised
Hash tables efficiencies by hash functions, load factors, and collision handling methods, with hash code distribution analysis.
A .NET implementation of Ponteil, a very fast, compact XOF/hash function/PRF based on AEGIS.
This is my coursework for the second semester of the first year in KPI , in which I implemented the search for given elements in the array
Зазвонов Илья Михайлович 6212
Strong, fast, simple, non-cryptography hash function 32 bit
[outdated] A Python cryptography package with more features, simplicity, and quality.
Strong, fast, simple, non-cryptography hash function 64 bit
Compile Time FNV Hash Functions written in C++14
Kriptografik Özet Fonksiyonlarının C# Programlama dili kodları. / C# Programming language codes of Cryptographic Digest Functions.
hash strings using a cyrb53 implementation - standard ascii characters only (Custom Variable Template for Server-Side Google Tag Manager)
A binding of the Blake3 hash algorithm for Ruby
Spring security
A binding of the KangarooTwelve hash algorithm for Ruby
A high-throughput, yet beefy 192-bit OWHF written in (reasonably) portable C11/17.
Add a description, image, and links to the hash-function topic page so that developers can more easily learn about it.
To associate your repository with the hash-function topic, visit your repo's landing page and select "manage topics."