Showing 23 open source projects for "sha3"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 1

    Largest Generic Hash and HMAC Program

    57 Hash Functions In One Program, plus each with HMAC or KMAC

    ...FEHASHMAC contains a set of known test vectors and results for each algorithm such that the correct implementation for each hardware platform and compiler version can directly be verified. Currently 57 hash algorithms like sha1 sha224 sha256 sha384 sha512 and variants, sha3 and shake, all SHA3 finalists and blake3, md2 md4 md5 md6, rmd128 rmd160 rmd256 rmd320, whirl gost lash160 lash256 lash384 lash512 tiger2 and RFC 2104 HMAC and KMAC support are included, plus SHA3 extensions kmac128, kmac256, kmacxof128, kmacxof256 for message.
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Plum Cave Twofish

    Plum Cave Twofish

    A version of Plum Cave that uses the ChaCha20 and Twofish ciphers

    A version of Plum Cave that employs the "ChaCha20 + Twofish-256 CBC + HMAC-SHA3-512" authenticated encryption scheme for data encryption and ML-KEM-1024 for quantum-resistant key exchange.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Plum Cave

    Plum Cave

    A cloud backup solution that employs advanced cryptography

    A cloud backup solution that employs the "ChaCha20 + Serpent-256 CBC + HMAC-SHA3-512" authenticated encryption scheme for data encryption and ML-KEM-1024 for quantum-resistant key exchange. Check it out at https://plum-cave.netlify.app/ GitHub page: https://github.com/Northstrix/plum-cave
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    RHash
    RHash (Recursive Hasher) is a console utility for computing and verifying hash sums of files. It supports CRC32, CRC32C, MD4, MD5, SHA1, SHA256, SHA512, SHA3, AICH, ED2K, DC++ TTH, BTIH, Tiger, GOST R 34.11-2012, RIPEMD-160, HAS-160, EDON-R, and Whirlpool.
    Leader badge
    Downloads: 1,044 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 5
    Blueberry Loom

    Blueberry Loom

    Cryptographically reinforced form builder

    A form builder that utilizes ML-KEM-1024, as well as the "ChaCha20 + Serpent-256 CBC + HMAC-SHA3-512" authenticated encryption scheme to enable end-to-end encryption for enhanced data protection. GitHub repository: https://github.com/Northstrix/blueberry-loom
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Tiny Password Manager

    Password Manager in a Single Source File

    Password Manager in a Single Source File
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    mendelson OFTP2

    mendelson OFTP2

    Implementation of the OFTP2 protocol (RFC 5024)

    The mendelson OFTP2 is a JAVA-based open source OFTP2 solution. It contains a logging- and configuration UI and supports encryption, digital signatures, message compression, TLS, certificate exchange, message routing, mail notification
    Leader badge
    Downloads: 30 This Week
    Last Update:
    See Project
  • 8
    xSum Hash Utility

    xSum Hash Utility

    Command-line utility for Windows which generates and verifies the hash

    ...Users can easily verify that your release is authentic and belongs to you by verifying both the file hashes, and the GPG key. Files that have been tampered with will return a warning to the user. Supported Algorithms: - CRC-8, 16, 32 - MD5 - SHA1 - SHA2-256, 384, 512 - SHA3-128, 224, 256, 384, 512 - Blake2b-128, 160, 256, 384, 512 - Blake2s-128, 160, 256, 384, 512 For a full explanation of using xSum, read https://github.com/Aetherinox/xsum-hash-utility/wiki/Getting-Started
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    RHash for Windows

    RHash for Windows

    RHash (Recursive Hasher) v1.4.0 for Windows 32-bits

    RHash (Recursive Hasher) is a console utility for calculation and verification of magnet links and various message digests, including CRC32, CRC32C, MD4, MD5, SHA1, SHA256, SHA512, SHA3, AICH, ED2K, DC++ TTH, BitTorrent BTIH, Tiger, GOST R 34.11-94, GOST R 34.11-2012, RIPEMD-160, HAS-160, EDON-R, and Whirlpool. Message digests are used to ensure and verify integrity of large volumes of data for a long-term storing or transferring. by Aleksey Kravchenko.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10

    Fox Encoder

    Multipurpose Encoder/decoder

    Encode / Decode (from and to) text, hex, base64. Also supports hash function including MD4, MD5, SHA1, SHA2, SHA3, Keccak including most lengths (224, 256, 384 and 512),
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11

    HashOR

    HashOR is used to create 84 hashes of a string or file.

    HashOR can create 84 hashes from data or file input. It also can create a TTH and AICH.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    GMR Digital Signature System

    GMR Digital Signature System

    GMR digital signature system

    Private keys are insecure in cloud server infrastructure. Chrome: right click - translate into English! https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2018/Spectre-NG_18052018.html System that creates key pairs and digital signatures and is based on the presumed difficulty of prime factorization. Please install on a virtual machine with Linux! Windows is not supported! German: System, das Schlüsselpaare und digitale Signaturen erstellt, und auf der vermuteten...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Open-Hashtool

    Open-Hashtool

    Comfortable hash-tool for texts and files

    Open-Hashtool is an easy2use Qt based application, which can be used to calculate the hash (MD4; MD5; SHA-1; SHA-224; SHA-256; SHA-384; SHA-512; SHA3-224; SHA3-256; SHA3-386; SHA3-512) of texts and files. It's compatible with Windows and Linux. But Linux users need Qt5.1 or Wine (configuration: Windows Version <= Windows 2008) to run the Open-Hashtool. Please read the Wiki for compiling instructions.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15

    PeaUtils

    File management utilities: split & join, secure delete, crc/hash

    Suite of file management utilities: split and join files, secure delete, verify checksum and hash values: CRC32. MD5, SHA1, SHA-256, SHA3 and more. Spin-off of PeaZip project.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 16
    CryptBench

    CryptBench

    A Benchmark which tests CPU cryptography performance

    ...Following Cipher/Hash Functions are used to generate a final CryptScore for the given CPU: 1. AES-256 2. Blowfish 3. Camellia-256 4. IDEA 5. Chacha20 6. SHA-512 7. SHA3-512(Keccack) 8. MD5 9. Blake2b 10. Whirlpool By default the application uses a buffer size of 256MiB and each test runs for 2 secs(per library test). CryptBench uses Libcpuid for CPU info.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    akmos

    Cryptography toolset

    Command line utility for encryption/decryption files, computing message digests
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Secure Hash Algorithm variant of the nist maintained Secure Hash Algorithm. this is a 1024 bit digest. Comments suggestions always welcome. Rick Removed old downloads as they are long outdated. The update is the last version I worked on. Algorithm is based on the SHA2 digest. I may work on an updated version for c++11
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Detailed Presentation of the GROESTL hash function, finalist to the SHA-3 competition organized by the NIST to decide which cryptographic hash algorithm will replace the famous SHA-2.I analyze and present the candidate algorithm I bet on since the beginning of the competition.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    file hashing

    this is a simple program to hash files

    this program can use 6 different hashs. its not the best but dont care. it uses SHA1 , SHA2 , SHA3 , SHA4 , MD5 , CRC32. its 100% open source so enjoy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Cryptkeeper

    Cryptkeeper Secuirty tool

    In this program you will find tools like : Rawdata tool , file encryption , text encryption , program updater , program protecter , password manager , program settings , defult settings , settings viewer and the last is the file hashing. the file hashing you can use 6 hashing types for the file encryption 1 since i ran out of time for it , and the text encryption has 17 different types 12 encrypt and 5 hashing types. some uses encryption keys and some dont. there are AES , 4DES , RC2 , RC4 , MD5 , SHA1 , SHA2 , SHA3 , SHA4 , XoR , Crypt , HeX , BINARY , Rijndael 256 , Obfuscation String , RSA , BASE64. The password manager anything saved WILL NOT BE ENCRYPTED so it is smart to protect the program from others not using it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    RotorCrypt X

    Free offline encryption – Enigma + AES-256-GCM – no cloud

    RotorCrypt X is a free offline hybrid encryption software for Windows 10/11. Three cryptographic layers: - Enigma rotor cipher with up to 50 rotors and 65,536 Unicode characters - AES-256-GCM military-grade encryption - HKDF-SHA3-256 key derivation with Perfect Forward Secrecy Quantum-resistant with 2^768 key space. No cloud. No server. No internet required. Runs portable from USB stick, no installation needed. Security: one-time handshake, replay protection, anti-debug detection, key destruction on tampering. Free for Windows 10/11 (64-bit). Available in 10 languages. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB