matteounitn / iHashDNALinks
Perceptual hashing library in python (with redis)
☆14Updated 4 years ago
Alternatives and similar repositories for iHashDNA
Users that are interested in iHashDNA are comparing it to the libraries listed below
Sorting:
- FPE - Format Preserving Encryption with FF3 in C☆14Updated 6 months ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 6 months ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 7 years ago
- A tiny, portable implementation of the IPCrypt specification in C.☆32Updated this week
- image perceptual hash based on ML☆28Updated 3 years ago
- O(1) Cryptography is an easy to use, hard to misuse Java cryptographic library based on O(1) cryptographic algorithms☆15Updated 3 years ago
- ☆12Updated 5 years ago
- Committing ChaCha20-BLAKE3, XChaCha20-BLAKE3, and XChaCha20-BLAKE3-SIV AEAD implementations.☆11Updated 3 years ago
- ☆25Updated 8 months ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Encryption Algorithm Combined☆30Updated 9 years ago
- AEGIS-256☆11Updated 3 years ago
- BAT KEM/Signature Reference Implementation☆23Updated 4 years ago
- Experimental committing AEAD designed by Soatok.☆10Updated 5 years ago
- Official implementation of paper "HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platfor Efficiency"☆18Updated 2 months ago
- CLI Java wrapper for the PhotoDNA library☆25Updated 2 months ago
- Tool for generation of data from cryptoprimitives (block and stream ciphers, hash functions). Cryptoprimitives are round-reduced and the …☆14Updated 3 years ago
- ☆113Updated 2 years ago
- An AES-based 384 bit permutation.☆21Updated 8 months ago
- The Raspberry Pi storage scrub station for USB thumb drives.☆22Updated 4 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆18Updated 9 months ago
- Haraka is a secure and efficient short-input hash function.☆59Updated 8 years ago
- Bindings for the NaCL implementation of Salsa20 and XSalsa20 by D. J. Bernstein☆32Updated 5 years ago
- Balloon Hashing implemented in Python☆17Updated last month
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- QARMA block cipher in C☆31Updated 3 years ago
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago
- ☆24Updated 3 years ago