Java implementation of FIPS 202, SHA3-xxxx, SHAKE128, SHAKE256
☆20Oct 13, 2020Updated 5 years ago
Alternatives and similar repositories for keccakj
Users that are interested in keccakj are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Java implementation of Keccak and SHA-3 hash functions.☆14Aug 19, 2022Updated 3 years ago
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 3 years ago
- Optimized (fast) Java Keccak/SHA3/SHAKED implementation☆14Oct 12, 2020Updated 5 years ago
- SHA-3 (Keccak) implementation in Java.☆57Mar 28, 2020Updated 6 years ago
- A blake2s java implementation☆19Jan 31, 2016Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Java implementation of the authenticated encryption algorithm Ascon☆17Oct 24, 2023Updated 2 years ago
- A pure Java implementation of BLAKE2 (RFC 7693)☆12Sep 12, 2023Updated 2 years ago
- A cryptographically secure pseudorandom number generator cli tool printing in a wide variety of byte encodings (hex, base64,..) and for m…☆14Sep 25, 2023Updated 2 years ago
- A Java library for working with Ascii85, also called Base85 - a form of binary-to-text encoding☆18Oct 13, 2020Updated 5 years ago
- Fixes the recent exploit of CustomPayload packet that causes server to crash☆13Mar 6, 2018Updated 8 years ago
- A Spigot/Bukkit Plugin that preforms different item modifications with easy to use commands.☆14Jul 25, 2025Updated 8 months ago
- A SPAM message filter using a naive Bayes classifier written in Java.☆16Feb 7, 2011Updated 15 years ago
- Hashing application☆13Aug 12, 2020Updated 5 years ago
- A standalone Java 7 implementation of HMAC-based key derivation function (HKDF) defined in RFC 5869 first described by Hugo Krawczyk. HKD…☆70Feb 12, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Py-SSA-Lib: Python implementation of the multichannel singular spectrum analysis (MSSA) and singular spectrum analysis (SSA)☆14Jul 21, 2025Updated 8 months ago
- encrypts your minecraft chat messages so nobody but you and your friends can see what you're saying. it's kind of a joke don't take it to…☆18Aug 21, 2018Updated 7 years ago
- KeePass Salsa20 Cipher Plugin☆24Apr 13, 2016Updated 10 years ago
- Chacha20 in Javascript☆24Apr 15, 2021Updated 5 years ago
- WebExtension to get notifications from GitHub☆13Oct 2, 2021Updated 4 years ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆19Feb 27, 2025Updated last year
- Java implementation of the BLAKE2b cryptographic hash function☆83Nov 21, 2022Updated 3 years ago
- A Java port of TweetNaCl from the original C☆22Nov 6, 2025Updated 5 months ago
- ChaCha20 + Poly1305☆27Apr 30, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Common sub-modules and procedures in lattice-based constructions☆27Jan 20, 2026Updated 2 months ago
- A statistic driven minecraft killaura detection KI☆10Mar 23, 2017Updated 9 years ago
- CHIP-8 interpreter written in Rust☆11May 23, 2020Updated 5 years ago
- Algorithms written in Python and Explained using Jupyter 📓 from the Cryptography 🔐 Book ~Forouzan.☆18Feb 20, 2022Updated 4 years ago
- Enhanced tools to edit existing Bukkit signs. This is a fork of Omel's SignEdit with improved functionality.☆22Jan 15, 2026Updated 3 months ago
- Simple anti-tamper embedded into a simple string encryption.☆10Mar 7, 2019Updated 7 years ago
- Simultaneously the simplest and most powerful Argon2 implemenation in Python☆21May 15, 2025Updated 11 months ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Feb 9, 2026Updated 2 months ago
- The Luhn algorithm is a simple checksum formula used to validate a variety of identification numbers, such as credit card numbers, IMEI n…☆10Dec 4, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Visual Hash for matching copies of visually similar images.☆16Mar 17, 2025Updated last year
- SDK Java da Rede☆10Mar 19, 2023Updated 3 years ago
- FIPS-204 (ML-DSA) implementation in Go☆19Feb 13, 2026Updated 2 months ago
- Adds support for Holograms, BossBar, Brewing stands, Enchantment tables for legacy versions☆11Apr 29, 2022Updated 3 years ago
- My best Java class to compress any String, short or long, with any character of human history☆12Feb 16, 2026Updated last month
- An experiment in fingerprint-free encrypted messaging☆34Jun 1, 2015Updated 10 years ago
- The advanced NoCheatPlus patchwork☆11Nov 7, 2016Updated 9 years ago