There are 2 repositories under sha3-512 topic.
A JavaScript/TypeScript implementation of the complete Secure Hash Standard (SHA) family (SHA-1, SHA-224/256/384/512, SHA3-224/256/384/512, SHAKE128/256, cSHAKE128/256, and KMAC128/256) with HMAC.
SHA1, SHA2, SHA3, BLAKE2 and BLAKE3 functions written in pure Lua and optimized for speed
A C# port of the TripleSec encryption scheme created by Chris Coyne, Maxwell Krohn, and Filippo Valsorda
Compile-time Evaluable SHA3: Permutation-Based Hash and Extendable-Output Functions
A pure managed C# implementation of well-known cryptographic hash functions such as SHA-family (SHA0, SHA1, SHA2, SHA3), MD-family (MD2, MD4, MD5), Keccak family, RIPEMD, Tiger, Haval, Snefru.
Hosting the images with multiply uploads, checking of checksum, lossless optimization.
NEON ARMv8 SHA3_2x: 2 times SHA3 or SHAKE128/256 in 01 call. Use In Post-Quantum Cryptography Submission
SYCL accelerated Binary Merklization using SHA1, SHA2 & SHA3
A terminal hashing program with many hashing algorithms and many output formats, and recursive hashing support
A simple file checksum for windows, support SHA-1, SHA-256, SHA-512, Blake2b, SHA-3
sha3sum Implementation in Go
Implementations of common hash algorithms in Rust
Java swing executable application. Encrypt and decrypt whatever you want using multiple encryption algorithms.
Pure Java implementation of EdDSA-SHA3 (ref10 https://github.com/hyperledger/iroha-ed25519)
EasyHash é um programa feito para obter hash de arquivos de forma simples e fácil, bastando apenas alguns cliques para realizar tal operação. Desenvolvido utilizando a linguagem Python
𝗳𝗶𝘀𝗵𝗰𝗿𝗮𝗰𝗸 the hash cracker written in Rust.
php hash generator
Similar to your everyday Password Manager (LastPass, OnePass, etc..) but locally stored and no big tech holding your personal information hostage
This crate provides an implementation of the Keccak (SHA-3) cryptographic hash function family.
Generate a SHA-3/512 hash for any string input.
一个以保障人权为核心理念的命令行通讯软件,专注于信息安全与隐私保护。目前已实现哈希验证身份和多算法加密通信等功能,为用户提供可靠的隐私保障。这个是**大陆特供版,没有Tor功能集成。
A command-line communication software focused on human rights, utilizing advanced algorithms to protect your privacy and security. It’s the international version of Chraypt, with integrated Tor support.
A Cryptography GUI App made as a pet project using Python standard libraries. To be used to encrypt text and small binary files. Uses standard AES-256-PBKDF2_SHA2 with random salts and iv. On top of which a Shift Cipher is used to completely obfuscate the AES-Output. Shift Ciphers are likely unbreakable if underlying text is random.
This is an open source web application that was specially developed to assist professionals in conducting surveys, forms, studies and assessment tests during the course of the Covid-19 pandemic.
SHA-0, SHA1, SHA2, SHA224, SHA256, SHA384, SHA512, SHA-512/224, SHA-512/256 SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, SHAKE 256 library
Hashes in different formats: BIP39 mnemonic, RFC1751 mnemonic, hexadecimal, Base64, Base62, Base58Check.
A simple Python script for generating a variety of hashes from safe urandom entropy.
Hash files or values with this python code
code refactoring and optimization assessment with nodejs, sha3-512, and jest
A high performance CUDA-based GPU accelerated Rainbow-Table maker (SHA-3 hash-based), written in C++ without any external libraries or dependencies needed.