Here are
148 public repositories
matching this topic...
A JavaScript/TypeScript implementation of the complete Secure Hash Standard (SHA) family (SHA-1, SHA-224/256/384/512, SHA3-224/256/384/512, SHAKE128/256, cSHAKE128/256, and KMAC128/256) with HMAC.
Updated
Jan 17, 2023
TypeScript
Encrypted personal archives
🔒 SpringBoot控制器统一的响应体编码/加密与请求体解密的注解处理方式,支持MD5/SHA/AES/DES/RSA | SpringBoot controller unified response body encoding/encryption and request body decryption annotation processing method.
Updated
Dec 11, 2022
Java
constexpr implementation of SHA-2 and SHA-3 family of hashes
Check hashes for your files - A GUI tool to generate, compare and verify MD5, SHA-1, SHA-256 & SHA-512 hashes.
Updated
Feb 24, 2023
Crystal
Generate SHA-256 hashes (in Node and the Browser)
Updated
Mar 3, 2021
JavaScript
A bitcoin miner for TI calculators (Ti-83 Premium CE/TI-84 Plus CE) fully written in Ti-Basic.
Secure Multi-Party Computation (MPC) with Go. This project implements secure two-party computation with Garbled circuit protocol.
Search a filesystem for indicators of compromise (IoC).
Updated
Feb 8, 2023
Python
A C++17 header-only library to easily retrieve hashes/HMACs from data, files, and files in nested directories through a simple interface.
Cloudbank project p2p digital currency with python3
Updated
Jul 15, 2022
JavaScript
native hashing for react-native
Updated
Oct 17, 2022
HTML
A simple tool to compute and compare hash value including from Explorer's context menu
Universal text data encryption and decryption tool based on AES-256 CBC. Encrypt text or custom files. Privacy secure encryption in your browser only.
Coze is a cryptographic JSON messaging specification designed for human readability.
Mobile Cipher library written in clean TypeScript
Updated
May 14, 2018
TypeScript
A cross-platform tool for calculating the hashes of files and plain texts.
Veil is an incredibly experimental hybrid cryptosystem for sending and receiving confidential, authentic multi-recipient messages which are indistinguishable from random noise by an attacker.
An optimized sample code for SHA256 and SHA512 using C intrinsic
Updated
May 31, 2020
Assembly
Encryptor made with Python
Updated
Oct 4, 2022
Python
Improve this page
Add a description, image, and links to the
sha-256
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
sha-256
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.