Cryptography , Hashing, Cryptanalysis ...
-
Updated
May 14, 2017 - Jupyter Notebook
Cryptography , Hashing, Cryptanalysis ...
This shows different levels of web authentication and security from encryption, hashing passwords to OAuth. Implementation of Sign in with Google is also included.
This is a c project. In this project, with the use of HashLists, an imitation of a database is being created. After that, a menu appears in the user screen, and the user enter their choice. They can create an appointment by adding the name, one of the 3 provided services and the amount of money the customer has paid, they could also search for a…
Practical Classes - SIO
Blockchain implementation using (python and javascript)
Repository with salted hashing algorithm
Discrete Trust-aware Matrix Factorization for Fast Recommendation. IJCAI, 2019.
Cryptographic library for Embarcadero Delphi and potentially for FPC as well
make your golang fiber api easier by using goease utilities
Add a description, image, and links to the hasing topic page so that developers can more easily learn about it.
To associate your repository with the hasing topic, visit your repo's landing page and select "manage topics."