matteounitn / iHashDNALinks
Perceptual hashing library in python (with redis)
☆14Updated 4 years ago
Alternatives and similar repositories for iHashDNA
Users that are interested in iHashDNA are comparing it to the libraries listed below
Sorting:
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 5 months ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 7 years ago
- ☆12Updated 5 years ago
- image perceptual hash based on ML☆28Updated 3 years ago
- O(1) Cryptography is an easy to use, hard to misuse Java cryptographic library based on O(1) cryptographic algorithms☆15Updated 3 years ago
- A tiny, portable implementation of the IPCrypt specification in C.☆31Updated 2 months ago
- Sphincs+ implementation which uses minimal RAM☆13Updated 2 years ago
- Encryption Algorithm Combined☆29Updated 9 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- AEGIS-256☆11Updated 3 years ago
- FPE - Format Preserving Encryption with FF3 in C☆14Updated 5 months ago
- Open source library to handle integers of any size in C☆14Updated 2 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Updated last year
- An AES-based 384 bit permutation.☆21Updated 6 months ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 3 years ago
- QARMA block cipher in C☆31Updated 3 years ago
- library providing OPRF and Threshold OPRF based on libsodium☆28Updated last month
- Worldline Yomani XR Flash Unpacker https://stefan-gloor.ch/yomani-hack☆46Updated last year
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆18Updated 8 months ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17Updated last year
- Calculate PhotoDNA hashes using Python☆44Updated 8 months ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated last month
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago
- A fast AES-PRF based secure random-number generator☆21Updated 2 years ago
- Collection of open-source JavaCard crypto algorithms. Optimized for memory and speed with unified interface☆12Updated last year
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- Balloon Hashing implemented in Python☆16Updated last week
- ☆28Updated 4 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 5 months ago
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆20Updated 2 years ago