[Feature complete] SHA-2-family hashing library
-
Updated
Jul 8, 2022 - C
[Feature complete] SHA-2-family hashing library
Bootloader16 examples using different verication methods including ECDSA
Stegman is a tool that employs cryptography and steganography to safely hide messages in various files. It can also reverse the process to extract information from a file.
A C implementation of the SHA 256 tree hash algorithm
This C project involves implementing hash functions (MD5, SHA256, SHA512, SHA384, SHA224) and encryption algorithms (Base64, DES) from scratch, employing object-oriented programming principles.
A library of functions written in C to calculate and manipulate SHA-256 digests.
Home-made implementation of the MD5 and SHA-suite hashing algorithms.
Login and Register C Application with SHA-256. Passwords kept as hashed. Basic database is implemented using bin files that allows you to search, register and login a user.
🔐 Collection Of Various Implementations Of Cryptographic Algorithms From Scratch In Various Languages
This repository contains C and/or C++ implementations for finding Local Collision Conforming Message Pairs through Differential Attack on Reduced-Round SHA-256 up to 24 Rounds. Also, this repository contains the C++ implementations of SHA-256, SHA-512 and SHA-384.
Add a description, image, and links to the sha-256 topic page so that developers can more easily learn about it.
To associate your repository with the sha-256 topic, visit your repo's landing page and select "manage topics."