Hash Function
Advanced File Calculator is a cryptographic data hash calculation software for files. Simply drag and drop files in this calculator and hash string for the files will be displayed on the fly. Supported cryptographic hash function algorithms include CRC32 control sum, GOST hash, MD2, MD4, MD5,...
Platforms: Windows, Other
License: Shareware | Cost: $19.95 USD | Size: 623.65 KB | Download (875): Advanced Hash Calculator Download |
Provides efficient, effective implementations of 32- and 64-bit hash functions based on Rabin fingerprints / irreducible polynomials, in Java. Also provides integration with java.security.MessageDigest API.
Platforms: Windows, Mac, Solaris, Linux
License: Freeware | Size: 66.81 KB | Download (49): Rabin Hash Function Download |
jssha256 is a compact JavaScript implementation of the SHA256 secure hash function. HMAC calculation is also available. Example The following code example computes the SHA256 hash value of the string 'abc'. SHA256_init(); SHA256_write("abc"); digest = SHA256_finalize(); digest_hex =...
Platforms: Windows, Mac, *nix, JavaScript, BSD Solaris
License: Freeware | Download (55): jsSHA Download |
MD5-utils is a script for MD5 hash function manipulations. It can crypt one or more word(s) and try to crack one or more hash(es) using online servers.
Platforms: Windows, Mac, Linux
License: Freeware | Size: 2.33 KB | Download (52): MD5-utils Download |
Pseudo-random string to float conversion script converts strings to floats in the range [0, 1), using a hash function.
Platforms: Windows, Mac, *nix, Python, BSD Solaris
License: Freeware | Download (51): Pseudo-random string to float conversion Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 18.29 MB | Download (39): KeyMingler Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Shareware | Cost: $0.00 USD | Size: 5.92 MB | Download (42): sausra Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 12.35 MB | Download (34): gurbas Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 5.32 MB | Download (38): nulis Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Shareware | Cost: $0.00 USD | Size: 6.65 MB | Download (39): Plikledis Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 5.16 MB | Download (38): Vakar Download |
H = hash;H('key') = value; %assign value to keyv = H('key'); % retrieve value for a keyH.keys % return cell array of keysH. values % return array of valuesH.idx % returns sparse matrix of indexesRemark:The hash function used is sum of the key.It can easily be changed if needed.
Platforms: Matlab
License: Shareware | Cost: $0.00 USD | Size: 10 KB | Download (44): Hash table declaration Download |
hashit is a generic hash library. hashit implements diverse collision handling methods. This function creates a hash table which is returned as a hash_t type. errno is set to ENOMEM if there wasnt enough memory avaliable for creating the table. Return value is a reference to the table just...
Platforms: *nix
License: Freeware | Size: 28.67 KB | Download (95): hashit Download |
RIPEMD160 is a Perl module that allows you to use the RIPEMD160 Message Digest algorithm from within Perl programs. This is a BETA Version. In the future it will be located in Crypt::RIPEMD160 and not in RIPEMD160. The module is based on the implementation from Antoon Bosselaers from Katholieke...
Platforms: *nix
License: Freeware | Size: 51.2 KB | Download (45): RIPEMD160 Download |
A simple program that can generate hashes such as md5, sha1, sha2 and many others.
Hash function - a function assigning any short number to any large number, always having a fixed size, non-specific, quasi-random value, so-called irreversible shortcut. In computer science, hash functions...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Freeware | Size: 2.27 MB | Download (2995): WDZ Hash Generator Download |
This is a straightforward Python wrapper for ssdeep by Jesse Kornblum, which is a library for computing context triggered piecewise hashes (CTPH). Also called fuzzy hashes, CTPH can match inputs that have homologies. Such inputs have sequences of identical bytes in the same order, although bytes...
Platforms: *nix
License: Freeware | Size: 317.44 KB | Download (41): ssdeep Download |
With this freeware MD5 hash values (checksums) of files can be created and compared. Because the hash function is determined by a file of any size, a fixed-length checksum. This cross-or checksum is similar to a fingerprint for each file, and almost unique. Thus, files can be compared without...
Platforms: Windows
License: Freeware | Size: 9.69 MB | Download (407): abylon FREEHASH Download |
Generates Message Digest using algorithms : SHA160, SHA-224, SHA256,SHA384,SHA512 Support for Bit Oriented Message -- Enter Message Length in Bits -- Either enter Message (HEX) or -- generate a random message of length LEN in Bits -- Select the Algorithm to generate MESG DIGEST LEN :: Enter Bit...
Platforms: Matlab
License: Shareware | Cost: $0.00 USD | Size: 10 KB | Download (45): SHA Algorithms 160,224,256, Download |
Py-Nimsilsa is a Python port of the Nilsimsa locality-sensitive hashing application. The difference between a usual hash function and this one is that a small change in the message results in a small change in the nilsimsa code.
Platforms: *nix
License: Freeware | Size: 10.24 KB | Download (44): py-nilsimsa Download |
Appnimi MD2 Decrypter helps in decrypting any MD2 hash string. In appropriate infrastructure it works at a speed of more than 1 million words/second. One of the fastest true MD2 Decrypter available in the market. Above all it is FREE.
The MD2 Message-Digest Algorithm is a cryptographic hash...
Platforms: Windows, Windows 8, Windows 7
License: Freeware | Size: 999 KB | Download (530): Appnimi MD2 Decrypter Download |