matteounitn / iHashDNALinks
Perceptual hashing library in python (with redis)
☆14Updated 4 years ago
Alternatives and similar repositories for iHashDNA
Users that are interested in iHashDNA are comparing it to the libraries listed below
Sorting:
- FPE - Format Preserving Encryption with FF3 in C☆14Updated 5 months ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 7 years ago
- Sphincs+ implementation which uses minimal RAM☆13Updated 2 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 5 months ago
- A tiny, portable implementation of the IPCrypt specification in C.☆31Updated last week
- Open source library to handle integers of any size in C☆14Updated 2 years ago
- ☆12Updated 5 years ago
- QARMA block cipher in C☆31Updated 3 years ago
- CLI Java wrapper for the PhotoDNA library☆25Updated last month
- Worldline Yomani XR Flash Unpacker https://stefan-gloor.ch/yomani-hack☆46Updated last year
- Balloon Hashing implemented in Python☆16Updated last month
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- O(1) Cryptography is an easy to use, hard to misuse Java cryptographic library based on O(1) cryptographic algorithms☆15Updated 3 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆18Updated 8 months ago
- A simpler alternative to the Noise protocol framework.☆21Updated 4 years ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 9 months ago
- The Firefox build that evades JavaScript anti-debugging debugger mechanisms☆37Updated last year
- An implementation of the ROCCA-S encryption scheme.☆20Updated 4 months ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated last month
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17Updated last year
- Committing ChaCha20-BLAKE3, XChaCha20-BLAKE3, and XChaCha20-BLAKE3-SIV AEAD implementations.☆11Updated 3 years ago
- Haraka is a secure and efficient short-input hash function.☆59Updated 8 years ago
- AEGIS-256☆11Updated 3 years ago
- ☆25Updated 7 months ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Updated last year
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆38Updated last year
- Provider library - a library of small helpers. These may or may not become part of OpenSSL at some point☆12Updated 7 months ago
- An AES-based 384 bit permutation.☆21Updated 7 months ago
- The Raspberry Pi storage scrub station for USB thumb drives.☆22Updated 4 years ago
- Encryption Algorithm Combined☆30Updated 9 years ago