-
### Finding Description
While the application runs, cryptographic APIs are monitored to identify any insecure usage of cryptographic algorithms or primitives.
In this case, insecure cryptographic has…
-
### Finding Description
While the application runs, cryptographic APIs are monitored to identify any insecure usage of cryptographic algorithms or primitives.
In this case, insecure cryptographic has…
-
**Is your feature request related to a problem? Please describe.**
Firstly, we look at the `Hashing` algorithm supports in `Zest_Framework/src/Hashing/
` folder, it only supports the `Bcrypt`, `Ar…
-
We have performed the static code analysis for the unmanaged c++ dll.
It reported the below error
Error BA2004 'ts2coreD.dll' is a native binary that directly compiles and links one or more obje…
-
- #536 implemented a loadbalancer feature with only roundrobin algorithm.
- After #556 we should have a solid code base to easily implement different algorithms per route.
We want to have some o…
-
-
### Search first
- [X] I searched and no similar issues were found
### Description
To comply with regional security requirements, namely the United States Federal Information Processing Standard (F…
-
### Describe your idea
~~The Cryptographic Accelerator would provide CC computers with common cryptographic algorithms done on the Java side which is faster than implementing them in Lua, possible …
-
Yescrypt is a notable algorithm:
* Publicly known, modern algorithm, by Solar Designer (@solardiz)
* PHC finalist: https://www.password-hashing.net/
* Interest appears to be increasing in this al…
-
Here is a list of hashing algorithms from HashTab 6.0 (without commercial license), you can also see them via click “Option” link:
![1](https://cloud.githubusercontent.com/assets/10364351/19760931/6b…