55 results for “topic:sha-3”
A JavaScript/TypeScript implementation of the complete Secure Hash Standard (SHA) family (SHA-1, SHA-224/256/384/512, SHA3-224/256/384/512, SHAKE128/256, cSHAKE128/256, and KMAC128/256) with HMAC.
constexpr implementation of SHA-2 and SHA-3 family of hashes
a protocol to encrypt communications and a cryptographic library based on Disco
Pure PHP implementation of Keccak (SHA-3)
Implementation of KangarooTwelve in Go
A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519
SHA-3 and other Keccak related algorithms in SPARK/Ada.
A C++17 header-only library to easily retrieve hashes/HMACs from data, files, and files in nested directories through a simple interface.
A simple tool to compute and compare hash value including from Explorer's context menu
Mobile Cipher library written in clean TypeScript
SHA-3 cpu and gpu (CUDA) calculation
CryptoJS is a growing collection of standard and secure cryptographic algorithms implemented in JavaScript using best practices and patterns. They are fast, and they have a consistent and simple interface.
Java implementation of Keccak and SHA-3 hash functions.
💪🔢🔒 bigint-hash: Hashing for TC39 BigInt Proposal
Pure D implementation of SHA-3 (Keccak-f[1600,24]) + DUB package
Lean 4 programming language and theorem prover cryptography experiments
Antelope cryptography library for ECC, RSA and SHA-3
SHA-3 implementation for 8-bit AVR
SHA-3 Step-by-Step Visualization
Library for calculation of SHA3 and Keccak hashes. Following hash variants are implemented: Keccak224, Keccak256, Keccak384, Keccak512, Keccak[], Keccak[c], SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128 and SHAKE256.
Readable and annotated implementation of SHA-3 in Rust
Raku Cryptography Playground
C# implementation of the SHA-3 algorithm.
:lemon:SHA-3 algorithm Keccak Implementation
Been written as bachelor thesis to measure speed differences between SHA-3 on both an Nvidia and AMD GPU
Generate checksums with Keccak-based algorithms, such as SHA-3.
Javaのハッシュ、暗号系
🔐 A collection of cryptographic algorithms implemented from scratch in Python, including hashing, encryption, and secure key exchange.
.Net core implementation of libdisco
A cryptography engine that uses quantum entropy from consumer webcam CMOS sensors.