balancedBalanceD is a Layer-4 Linux Virtual Server (LVS) based load balancing platform for Kubernetes.
Stars: ✭ 34 (-24.44%)
enigmaA fast, native, cryptographic engine for the web
Stars: ✭ 101 (+124.44%)
hkdfA standalone Java 7 implementation of HMAC-based key derivation function (HKDF) defined in RFC 5869 first described by Hugo Krawczyk. HKDF follows the "extract-then-expand" paradigm which is compatible to NIST 800-56C Rev. 1 two step KDF
Stars: ✭ 47 (+4.44%)
password-hasherThe PasswordHasher component provides password hashing utilities.
Stars: ✭ 425 (+844.44%)
telfhashSymbol hash for ELF files
Stars: ✭ 75 (+66.67%)
Scala HashingFast non-cryptographic hash functions for Scala
Stars: ✭ 66 (+46.67%)
MD5-Hash-ChangerC# Application to Change MD5 Hash of any file
Stars: ✭ 111 (+146.67%)
Argon2 JvmArgon2 Binding for the JVM
Stars: ✭ 245 (+444.44%)
MHCLNDeep Metric and Hash Code Learning Network for Content Based Retrieval of Remote Sensing Images
Stars: ✭ 30 (-33.33%)
LibdictC library of key-value data structures.
Stars: ✭ 234 (+420%)
blurhashBlurhash encoder/decoder algorithm implemenation in Nim.
Stars: ✭ 26 (-42.22%)
Blake2fastOptimized BLAKE2 hashing implementations in C#
Stars: ✭ 63 (+40%)
SHA256A C++ SHA256 implementation.
Stars: ✭ 79 (+75.56%)
ShokoserverRepository for Shoko Server.
Stars: ✭ 184 (+308.89%)
djb2aDJB2a non-cryptographic hash function
Stars: ✭ 31 (-31.11%)
tss-rbA Ruby implementation of Threshold Secret Sharing (Shamir) as defined in IETF Internet-Draft draft-mcgrew-tss-03.txt
Stars: ✭ 22 (-51.11%)
ipld-explorer-cli🔎 Explore the IPLD directed acyclic graph with your keyboard
Stars: ✭ 22 (-51.11%)
Auth AdtAuthenticated Data Structures Generically
Stars: ✭ 150 (+233.33%)
go-checksumSimple tool to calc Golang module checksum of go.mod and module dir.
Stars: ✭ 45 (+0%)
SketchySketching Algorithms for Clojure (bloom filter, min-hash, hyper-loglog, count-min sketch)
Stars: ✭ 138 (+206.67%)
Poseidon252Reference implementation for the Poseidon Snark-friendly Hash algorithm.
Stars: ✭ 95 (+111.11%)
ThmapConcurrent trie-hash map library
Stars: ✭ 51 (+13.33%)
hashids.pmHashids, ported for Perl
Stars: ✭ 15 (-66.67%)
HashratHashing tool supporting md5,sha1,sha256,sha512,whirlpool,jh and hmac versions of these. Includes recursive file hashing and other features.
Stars: ✭ 46 (+2.22%)
phc-cryptoHashing algorithms simplified (supports Argon2, Bcrypt, Scrypt, and PBKDF2)
Stars: ✭ 22 (-51.11%)
HashGANHashGAN: Deep Learning to Hash with Pair Conditional Wasserstein GAN
Stars: ✭ 63 (+40%)
sdbmSDBM non-cryptographic hash function
Stars: ✭ 43 (-4.44%)
py-cryptonightPython Cryptonight binding / extension. Monero hash function, proof-of-work, cn_slow_hash()
Stars: ✭ 20 (-55.56%)
WebcryptoW3C Web Cryptography API for Node.js
Stars: ✭ 79 (+75.56%)
Md5 SimdAccelerate aggregated MD5 hashing performance up to 8x for AVX512 and 4x for AVX2. Useful for server applications that need to compute many MD5 sums in parallel.
Stars: ✭ 71 (+57.78%)
space-routerFramework agnostic router for single page apps
Stars: ✭ 36 (-20%)
Lazysodium AndroidAn Android implementation of the Libsodium cryptography library. For the lazy dev.
Stars: ✭ 69 (+53.33%)
Parallel XxhashCompute xxHash hash codes for 8 keys in parallel
Stars: ✭ 36 (-20%)
go-merkleA fixed Merkle Tree implementation in Go
Stars: ✭ 36 (-20%)
String HashGet the hash of a string
Stars: ✭ 56 (+24.44%)
typo3-secure-downloadsSecure your assets and data from unwanted download. Apply TYPO3 access rights to ALL file assets (PDFs, TGZs or JPGs etc. - configurable) - protect them from direct access.
Stars: ✭ 15 (-66.67%)
Farmhash.sharpPort of Google's farmhash algorithm to .NET
Stars: ✭ 52 (+15.56%)
haiti🔑 A CLI tool to identify the hash type of a given hash.
Stars: ✭ 95 (+111.11%)
BlockHashLocRecover files using lists of blocks hashes, bypassing the File System entirely
Stars: ✭ 45 (+0%)
Deep MihashCode for papers "Hashing with Mutual Information" (TPAMI 2019) and "Hashing with Binary Matrix Pursuit" (ECCV 2018)
Stars: ✭ 13 (-71.11%)
Node Argon2Node.js bindings for Argon2 hashing algorithm
Stars: ✭ 1,008 (+2140%)
blockchainNo description or website provided.
Stars: ✭ 28 (-37.78%)
RhashmapRobin Hood hash map library
Stars: ✭ 33 (-26.67%)
sha3SHA3 for Ruby is a XKCP based native (C) binding to SHA3 (FIPS 202) cryptographic hashing algorithm
Stars: ✭ 35 (-22.22%)
Java Competitive ProgrammingI have written some important Algorithms and Data Structures in an efficient way in Java with proper references to time and space complexity. These Pre-cooked and well-tested codes help to implement larger hackathon problems in lesser time. DFS, BFS, LCA, All Pair Shortest Path, Longest Common Subsequence, Binary Search, Lower Bound Search, Maximal Matching, Matrix Exponentiation, Segment Tree, Sparse Table, Merge Sort, Miller Prime Test, Prims - Minimum Spanning Tree, BIT - Binary Index Tree, Two Pointers, BST - Binary Search Tree, Maximum Subarray Sum, Immutable Data Structures, Persistent Data Structurs - Persistent Trie, Dijkstra, Z - Function, Minimum Cost Maximal Matching, Heavy Light Decomposition, Knapsack, Suffix Array and LCP - Longest Common Prefix, Squre Root Decomposition, Kth Order Statics, Trie / Prefix Tree, LIS - Longest Increasing Subsequence, Hashing
Stars: ✭ 24 (-46.67%)
SirixSirixDB is a temporal, evolutionary database system, which uses an accumulate only approach. It keeps the full history of each resource. Every commit stores a space-efficient snapshot through structural sharing. It is log-structured and never overwrites data. SirixDB uses a novel page-level versioning approach called sliding snapshot.
Stars: ✭ 638 (+1317.78%)
CryptionTool一个CTF+渗透测试工具框架,集成常见加解密,密码、编码转换,端口扫描,字符处理等功能
Stars: ✭ 62 (+37.78%)
WebCrypto.swiftA small collection of cryptographic functions based on the JavaScript WebCrypto API.
Stars: ✭ 16 (-64.44%)
cisip-FIReFast Image Retrieval (FIRe) is an open source project to promote image retrieval research. It implements most of the major binary hashing methods to date, together with different popular backbone networks and public datasets.
Stars: ✭ 40 (-11.11%)
Lazy importerlibrary for importing functions from dlls in a hidden, reverse engineer unfriendly way
Stars: ✭ 544 (+1108.89%)
xxHash-SwiftxxHash framework in Swift.
Stars: ✭ 22 (-51.11%)
IJCAI2018 SSDHSemantic Structure-based Unsupervised Deep Hashing IJCAI2018
Stars: ✭ 38 (-15.56%)
hash-avatar🌈 Hash avatar algorithm
Stars: ✭ 33 (-26.67%)