9 projects for "hash" with 2 filters applied:

  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • 1

    Largest Generic Hash and HMAC Program

    57 Hash Functions In One Program, plus each with HMAC or KMAC

    FEHASHMAC is the largest collection of publicly known hash algorithms integrated into a command-line utility. FEHASHMAC contains a set of known test vectors and results for each algorithm such that the correct implementation for each hardware platform and compiler version can directly be verified. Currently 57 hash algorithms like sha1 sha224 sha256 sha384 sha512 and variants, sha3 and shake, all SHA3 finalists and blake3, md2 md4 md5 md6, rmd128 rmd160 rmd256 rmd320, whirl gost lash160 lash256 lash384 lash512 tiger2 and RFC 2104 HMAC and KMAC support are included, plus SHA3 extensions kmac128, kmac256, kmacxof128, kmacxof256 for message.
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    ...Key derivation functions: PBKDF2, scrypt, Argon2, HKDF. Includes sample command-line tools: - 'digest' - for calculating and verifying file checksum(s) using any of the supported hash algorithms (similar to md5sum or RHash). - 'cryptor' - for file encryption using Serpent-256 algorithm in AEAD mode. Check out the cppcrypto web site linked below for programming documentation.
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    StructPie

    StructPie

    A set of C libraries to implement data structures and algorithms

    Struct-Pie (Structures Pie) is a set of C shared libraries to implement data structures and algorithms so that they can be used/integrated easily into C projects. LIFO & FIFO Stack, Binary Search Tree, Priority Queue and a Hash Table are implemented and included in this package. Future releases will have many other data structures. The hash table in this package uses separate chaining to avoid collision. In the "hash_table" directory, the hash table implementation uses linked lists. While in "HashBSTree" directory, a hash table with a binary tree in each index is implemented for faster lookup in large data. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    ftdetector

    File type detector library

    This project is a tool to detect file types by signatures and mime types. It uses hash tables to make the detection of a file type as fast as possible. The signature and mime types lists are stored at simple user-friendly files. This file type detector supports a lot of formats (image, archive, text, documents, audio, video, fonts and others). It also includes Microsoft OLE compound file types. The detector's algorythm has special features to detect text file types like (HTML, XML, JSON, etc.) and text file UNICODE charsets by using their BOMs (Byte order marks). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Smart, Efficient, and Anonymous People Counting Solutions Icon
    Smart, Efficient, and Anonymous People Counting Solutions

    Capture your visitor traffic and draw insights from your data with right-sized footfall counters, app and a cloud-based analytics platform

    We help Retailers, Libraries, Casinos, Universities, Places of worship, Office buildings, and other industries to analyze and take action on their people traffic trend.
    Learn More
  • 5
    ALEPH-w

    ALEPH-w

    Data structures and Algorithms library

    ...It contains the main data structures: single and double lists, special arrays (dynamic and of bits), many types of trees: multitrees, binary search trees, avl, red-black, randomized, treaps, splay and other interesting types. Several types of hash tables are implemented: separated chaining, open adressing with linear probing and double function hash; this last one has a garbage colector mechanism that allows to free deleted entries. Dynamic linear hash tables are implemented too. The main algorithms on graphs are implemented in an easy way and with good performance features. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    libcutils

    Some Useful C-Utilities

    Libcutils provides a self-contained set of fundamental routines which are essential to basically any Unix utility or daemon application written in C. The library provides fundamental data structures such as lists, hash-maps, strings and parsing functions for JSON or the typical dot-file based configuration data. The following list summarizes the currently supported functionality: * length delimited instead of NULL terminated strings * memory management based on reference counting * several list processing functions like iterators and map-reduce * support of [Ideal Hash Tries](http://infoscience.epfl.ch/record/64398/files/idealhashtrees.pdf) for highly efficient hash map data structures * parsers for [JSON](http://json.org) data and the text configuration files found in Unix system * doubly linked circular lists for reliable event queues * support for test and debugging of memory management problems such as memory leaks
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    libhash

    libhash

    Thread safe hash library

    A hash table library that can store binary data. It is thread safe and you can use as many hash tables in your program as you wish because each has its own context. You can drop items from the hash table and can expire items that have become too old. String keys are default, but with your own comparison routine you can use binary or specialty keys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    C++ implementation of Hash Array Mapped Trie (HAMT). Class design follows STL principles and aims to meet the requirements and to provide the guarantees of std::hash_map.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    bin.net

    rapid, useful pocket tool that helps you to operate binary data easiy

    bin.net is a rapid, useful pocket tool that helps you to present, analyze, hash binary data easily
    Downloads: 0 This Week
    Last Update:
    See Project
  • Comprehensive law practice management in one complete system Icon
    Comprehensive law practice management in one complete system

    When it becomes clear you need to make a change, Change to a Complete Solution

    Tabs3 delivers rapid return on investment, increased profitability and reliable performance forhundreds of law firms nationwide.
    Learn More
  • Previous
  • You're on page 1
  • Next