51 results for “topic:sha3-512”
A JavaScript/TypeScript implementation of the complete Secure Hash Standard (SHA) family (SHA-1, SHA-224/256/384/512, SHA3-224/256/384/512, SHAKE128/256, cSHAKE128/256, and KMAC128/256) with HMAC.
SHA1, SHA2, SHA3, BLAKE2 and BLAKE3 functions written in pure Lua and optimized for speed
C++ implementation of SHA-3 hash.
A C# port of the TripleSec encryption scheme created by Chris Coyne, Maxwell Krohn, and Filippo Valsorda
Hashing application
:books: Provides a handy way to hash data using Adler32, CRC (8-bit to 82-bit, and customizable without bit restriction), MD5, SHA-1, SHA-2 and SHA-3 (256-bit, 384-bit and 512-bit), including HMAC keyed hashing for some types. Functions for encrypting and decrypting data with Rijndael (128-bit, 192-bit and 256-bit) are also offered
Python Script for Hash Cracking
A pure managed C# implementation of well-known cryptographic hash functions such as SHA-family (SHA0, SHA1, SHA2, SHA3), MD-family (MD2, MD4, MD5), Keccak family, RIPEMD, Tiger, Haval, Snefru.
NEON ARMv8 SHA3_2x: 2 times SHA3 or SHAKE128/256 in 01 call. Use In Post-Quantum Cryptography Submission
Hosting images with multiple uploads, checksum verification, and lossless optimization.
A CNG implementation of new encryption algorithms
SYCL accelerated Binary Merklization using SHA1, SHA2 & SHA3
A terminal hashing program with many hashing algorithms and many output formats, and recursive hashing support
A simple file checksum for windows, support SHA-1, SHA-256, SHA-512, Blake2b, SHA-3
a bookmarklet, a universal password generator by one master password
sha3sum Implementation in Go
Java swing executable application. Encrypt and decrypt whatever you want using multiple encryption algorithms.
Implementations of common hash algorithms in Rust
EasyHash é um programa feito para obter hash de arquivos de forma simples e fácil, bastando apenas alguns cliques para realizar tal operação. Desenvolvido utilizando a linguagem Python
Similar to your everyday Password Manager (LastPass, OnePass, etc..) but locally stored and no big tech holding your personal information hostage
Generate a SHA-3/512 hash for any string input.
A simple Python script for generating a variety of hashes from safe urandom entropy.
𝗳𝗶𝘀𝗵𝗰𝗿𝗮𝗰𝗸 the hash cracker written in Rust.
This crate provides an implementation of the Keccak (SHA-3) cryptographic hash function family.
This is a command-line encryption and decryption tool leveraging military-grade encryption standards. It is lightweight, easy to use, and optimized for secure data operations.
This is an open source web application that was specially developed to assist professionals in conducting surveys, forms, studies and assessment tests during the course of the Covid-19 pandemic.
A Cryptography GUI App made as a pet project using Python standard libraries. To be used to encrypt text and small binary files. Uses standard AES-256-PBKDF2_SHA2 with random salts and iv. On top of which a Shift Cipher is used to completely obfuscate the AES-Output. Shift Ciphers are likely unbreakable if underlying text is random.
SHA-0, SHA1, SHA2, SHA224, SHA256, SHA384, SHA512, SHA-512/224, SHA-512/256 SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, SHAKE 256 library
🔒 Securely encrypt and authenticate data with EAMSA 512, a high-performance, production-ready Go implementation featuring 512-bit block size and 1024-bit key material.
Hashes in different formats: BIP39 mnemonic, RFC1751 mnemonic, hexadecimal, Base64, Base62, Base58Check.