matteounitn / iHashDNALinks
Perceptual hashing library in python (with redis)
☆13Updated 4 years ago
Alternatives and similar repositories for iHashDNA
Users that are interested in iHashDNA are comparing it to the libraries listed below
Sorting:
- FPE - Format Preserving Encryption with FF3 in C☆14Updated last month
- A tiny library to properly encrypt IP addresses.☆20Updated last month
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 7 years ago
- ☆12Updated 4 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated last month
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- QARMA block cipher in C☆30Updated 2 years ago
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆19Updated 2 years ago
- O(1) Cryptography is an easy to use, hard to misuse Java cryptographic library based on O(1) cryptographic algorithms☆15Updated 2 years ago
- An AES-based 384 bit permutation.☆21Updated 3 months ago
- ☆112Updated 2 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago
- Encryption Algorithm Combined☆27Updated 9 years ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆14Updated 4 years ago
- A fork of the Practically Random suite of statistical tests & psuedo-random number generators (RNGs, PRNGs)☆22Updated 4 years ago
- ☆24Updated 2 months ago
- Collection of open-source JavaCard crypto algorithms. Optimized for memory and speed with unified interface☆12Updated 10 months ago
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Updated 2 years ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆37Updated 7 months ago
- Committing ChaCha20-BLAKE3, XChaCha20-BLAKE3, and XChaCha20-BLAKE3-SIV AEAD implementations.☆11Updated 3 years ago
- SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.☆21Updated 3 months ago
- Masked Ascon Software Implementations☆11Updated 3 years ago
- Solutions to https://cryptopals.com problems☆28Updated 3 months ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 5 months ago
- Balloon Hashing implemented in Python☆15Updated last year
- Sphincs+ implementation which uses minimal RAM☆11Updated last year
- Experimental committing AEAD designed by Soatok.☆10Updated 4 years ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆31Updated 3 months ago
- Official implementation of paper "HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platfor Efficiency"☆14Updated 3 weeks ago
- ☆23Updated 3 years ago