33 results for “topic:shake256”
SHA-3 and other Keccak related algorithms in SPARK/Ada.
SHA3 for Ruby: SHA-3 (FIPS 202), SHAKE128/SHAKE256, cSHAKE128/cSHAKE256, and KMAC (NIST SP 800-185), powered by XKCP
Hashpic creates an image from a MD5, SHA512, SHA3-512, Blake2b or SHAKE256 hash
generate plaintext pictures from a hash, similar to OpenSSH's keygen randomart
META LAYER: Post-Quantum Transitory Cryptocurrency & Nexus
secretbase - Cryptographic Hash, Extendable-Output and Binary/Text Encoding Functions
Hashing application
VGP (Very Good Privacy) E2E Encryption Library
Implementation of GOST R 34.11-94, GOST R 34.11-2012 (STRIBOG-256/512), SHA, SHA2 hash functions and hash based algorithms: HMAC, PBKDF, SSHA.
Antelope cryptography library for ECC, RSA and SHA-3
A simple, cross-platform command line tool for hashing files and text.
SPHINCS+: Stateless Hash-based Digital Signature Algorithm
NEON ARMv8 SHA3_2x: 2 times SHA3 or SHAKE128/256 in 01 call. Use In Post-Quantum Cryptography Submission
PostQuantum ML-KEM, ML-DSA and SLH-DSA Algorithms in C# (FIPS 203, FIPS 204, FIPS 205)
SHA-3 SHAKE implementation in PHP
This script is a simple password hashing tool that allows users to choose from various hashing algorithms to hash their passwords.
Implementations of common hash algorithms in Rust
Bitcoin anchored, ML-DSA signed time authority providing monotonic, replay safe EpochTicks for consent windows, policy enforcement, runtime validation, and alignment freshness.
A command line tool for text and file encryption
SHAKE128 and SHAKE256 for Julia
No description provided.
A simple Python script for generating a variety of hashes from safe urandom entropy.
Secure and efficient one-time pad generation using Diffie-Hellman key exchange and SHA-3 SHAKE-256
SHA-0, SHA1, SHA2, SHA224, SHA256, SHA384, SHA512, SHA-512/224, SHA-512/256 SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, SHAKE 256 library
implementation of SHA3-256 uses the Keccak algorithm with MicroPython
This is a command-line encryption and decryption tool leveraging military-grade encryption standards. It is lightweight, easy to use, and optimized for secure data operations.
(Turbo)SHAKE256 XOF-based Portable C++20 Cryptographically Secure Pseudo Random Number Generator (CSPRNG)
A simple command-line utility to generate a comprehensive set of hashes for any given text string. This script dynamically uses all algorithms from Python's hashlib.algorithms_guaranteed (MD5, SHA-1, SHA-256, SHA-3, BLAKE2, SHAKE, etc.).
BBS signature scheme
A memory-hard password-hashing function