There are 0 repository under sha3-256 topic.
SHA1, SHA2, SHA3, BLAKE2 and BLAKE3 functions written in pure Lua and optimized for speed
constexpr implementation of SHA-2 and SHA-3 family of hashes
Ghostdrive Private IPFS for business and enterprise! Own your data
SHA3-256 MINER CORE
DE10 NANO SHA3-256 Proof of Work Miner
A few examples use the crypto ++ library for hash functions, block ciphers, public key signature schemes.
Compile-time Evaluable SHA3: Permutation-Based Hash and Extendable-Output Functions
theHasher> Create strong and unbreakable passwords by using Hash Functions. Generate Hashes and store them in txt files. Use the txt files as lists to execute Brute Force Attacks!
NEON ARMv8 SHA3_2x: 2 times SHA3 or SHAKE128/256 in 01 call. Use In Post-Quantum Cryptography Submission
SYCL accelerated Binary Merklization using SHA1, SHA2 & SHA3
A pure managed C# implementation of well-known cryptographic hash functions such as SHA-family (SHA0, SHA1, SHA2, SHA3), MD-family (MD2, MD4, MD5), RIPEMD, Tiger, Haval, Snefru.
A simple file checksum for windows, support SHA-1, SHA-256, SHA-512, Blake2b, SHA-3
Manage archives. Mainly on LTO tapes with LTFS, but works on disks.
Implementations of common hash algorithms in Rust
Explore hashing algorithm performance with this Python script. It measures the average time needed to hash random strings of varying lengths, leveraging multiprocessing for efficient concurrent hashing. The script produces insightful bar chart visualizations, stores results in JSON format, and generates interactive HTML plots for in-depth analysis.
Generate a SHA-3/256 hash for any string input.
sha3sum Implementation in Go
SHA-0, SHA1, SHA2, SHA224, SHA256, SHA384, SHA512, SHA-512/224, SHA-512/256 SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, SHAKE 256 library
CriptoRPS - a Rock, Paper, Scissors game with a cryptographic twist! This command-line game is built using JavaScript and incorporates HMAC
A parallelized command line utility for mining Ethereum addresses with n zero bytes.
A .py application to hash secure user entered sensitive data or passwords using the SHA3-256 Crypto Algorithm, to make one's available online data secure & resistive against possible data breaches online.
A program that determines the exact date of birth of a student, based on the SHA-3 hash function result and the year student was born.
Cryptography with golang
Secure Hash Algorithm 3 with SHA3-224, SHA3-256, SHA3-384, SHA3-512, Shake-128 and Shake-256
Script used to generate cryptography hashes MD4, SHA256, SHA3_224 for a given files