Compare commits

...

5 Commits

Author SHA1 Message Date
Dim K 905579e176
Merge 9948eecbb1 into 4a5f326e77 2023-09-01 14:56:57 -07:00
Alok Menghrajani 4a5f326e77
Fixes typo in README.md (#190)
s/implmentation/implementation/
2023-07-30 14:38:20 +03:00
Bronius G 80dfbf0ebd
Added SHA3 hash function (#189) 2023-07-26 22:09:43 +03:00
Dim K 9948eecbb1
Update README.md
yarn test runs with no errors now
2022-09-03 07:21:07 +00:00
Dim K eb0499d729
Update README.md
Added @deliberative/crypto npm package.
2022-09-02 14:58:21 +00:00
1 changed files with 3 additions and 1 deletions

View File

@ -88,6 +88,7 @@ A curated list of cryptography resources and links.
- [MD5](https://en.wikipedia.org/wiki/MD5) - Widely used hash function producing a 128-bit hash value. MD5 was initially designed to be used as a cryptographic hash function, but it has been found to suffer from extensive vulnerabilities. It can still be used as a checksum to verify data integrity, but only against unintentional corruption.
- [SHA1](https://en.wikipedia.org/wiki/SHA-1) - Cryptographic hash function designed by the NSA. SHA-1 produces a 160-bit hash value known as a message digest. SHA-1 is no longer considered secure against well-funded opponents.
- [SHA2](https://en.wikipedia.org/wiki/SHA-2) - Set of hash functions designed by the NSA. SHA-256 and SHA-512 are novel hash functions computed with 32-bit and 64-bit words, respectively. They use different shift amounts and additive constants, but their structures are otherwise virtually identical, differing only in the number of rounds.
- [SHA3](https://en.wikipedia.org/wiki/SHA-3) - Cryptographic hash function that produces a fixed-size output, typically 224, 256, 384, or 512 bits, from variable-size input data. It is part of the SHA-3 family of cryptographic algorithms designed to resist attacks from quantum computers and offers security properties such as pre-image resistance, second pre-image resistance, and collision resistance.
### Articles
@ -261,6 +262,7 @@ A curated list of cryptography resources and links.
### JavaScript
- [@deliberative/crypto](https://github.com/deliberative/crypto) - Typescript/WebAssembly library for Ed25519 public key cryptography, AEAD secret boxes, Shamir secret sharing and random shuffling. Runs on Nodejs, ESM, CommonJS and the browser.
- [asmCrypto](https://github.com/vibornoff/asmcrypto.js/) - JavaScript implementation of popular cryptographic utilities with performance in mind.
- [bcrypt-Node.js](https://github.com/shaneGirish/bcrypt-Node.js) - Native implementation of bcrypt for Node.js.
- [cifre](https://github.com/openpeer/cifre) - Fast crypto toolkit for modern client-side JavaScript.
@ -354,7 +356,7 @@ encryption library providing MD5, SHA1, SHA2 hashing and HMAC functionality, as
- [charm](https://github.com/JHUISI/charm) - Framework for rapidly prototyping cryptosystems.
- [Crypto-Vinaigrette](https://github.com/aditisrinivas97/Crypto-Vinaigrette) - Quantum resistant asymmetric key generation tool for digital signatures.
- [cryptography](https://cryptography.io/en/latest/) - Python library which exposes cryptographic recipes and primitives.
- [cryptopy](https://sourceforge.net/projects/cryptopy/) - Pure python implmentation of cryptographic algorithms and applications.
- [cryptopy](https://sourceforge.net/projects/cryptopy/) - Pure python implementation of cryptographic algorithms and applications.
- [django-cryptography](https://github.com/georgemarshall/django-cryptography) - Easily encrypt data in Django.
- [ecdsa](https://github.com/tlsfuzzer/python-ecdsa) - An easy-to-use implementation of ECC with support for ECDSA and ECDH.
- [hashids](https://github.com/davidaurelio/hashids-python) - Implementation of [hashids](http://hashids.org) in Python.