Hash tables efficiencies by hash functions, load factors, and collision handling methods, with hash code distribution analysis.
-
Updated
Sep 24, 2023 - Python
Hash tables efficiencies by hash functions, load factors, and collision handling methods, with hash code distribution analysis.
Implementation and round-reduced preimage attacks on BLAKE2s hash function.
Implementation and round-reduced preimage attacks on BLAKE-256 hash function.
This is my coursework for the second semester of the first year in KPI , in which I implemented the search for given elements in the array
Strong, fast, simple, non-cryptography hash function 32 bit
Strong, fast, simple, non-cryptography hash function 64 bit
Kriptografik Özet Fonksiyonlarının C# Programlama dili kodları. / C# Programming language codes of Cryptographic Digest Functions.
🐚 The objective of this project is for you to create a simple shell.
This project uses a hash table with quadratic probing to store individual strands of DNA. Once the hash table reaches its capacity, all the data is copied into a new table with a capacity four times greater than the previous one.
Argon2 key derivation function/cryptographic hash function utility for use cases like password hashing in PHP.
yet another 256-bit SHA hack
Sinsemilla hash function haskell implementation
Web application securised
hash strings using a cyrb53 implementation - standard ascii characters only (Custom Variable Template for Server-Side Google Tag Manager)
low level programming language
[outdated] A Python cryptography package with more features, simplicity, and quality.
Spring security
A binding of the Blake3 hash algorithm for Ruby
Add a description, image, and links to the hash-function topic page so that developers can more easily learn about it.
To associate your repository with the hash-function topic, visit your repo's landing page and select "manage topics."