A Cryptography Library for Maids
-
Updated
Oct 15, 2024 - C
A Cryptography Library for Maids
50 years of hashing, CRC32, MD5, SHA, SHA-256
Program for Windows which helps you generate, verify, and sign hash digests for your project using GPG integration. Supports algorithms such as SHA-2, SHA-3, CRC, Blake2b, Blake2s, etc.
SHA-2 (Secure Hash Algorithm 2), which includes SHA-256, is among the most widely used hashing algorithms today
Kriptografik Özet Fonksiyonlarının C# Programlama dili kodları. / C# Programming language codes of Cryptographic Digest Functions.
An exercice made during an interview, now a way to explain hash functions and their mechanism in Erlang
Secure Python-based password manager using AES encryption. Features include password generation, storage, update, delete and retrieval from a MySQL database. Easy-to-use command-line interface.
Secure Hash Algorithm library implementation in C
Sample implementation of SHA-256 message digest algorithm in Rust
A JavaScript/TypeScript implementation of the complete Secure Hash Standard (SHA) family (SHA-1, SHA-224/256/384/512, SHA3-224/256/384/512, SHAKE128/256, cSHAKE128/256, and KMAC128/256) with HMAC.
A C++17 header-only library to easily retrieve hashes/HMACs from data, files, and files in nested directories through a simple interface.
Add a description, image, and links to the sha-2 topic page so that developers can more easily learn about it.
To associate your repository with the sha-2 topic, visit your repo's landing page and select "manage topics."