-
### Describe your idea
~~The Cryptographic Accelerator would provide CC computers with common cryptographic algorithms done on the Java side which is faster than implementing them in Lua, possible …
-
Please check if there is any problem with using weak cryptographic algorithms.
The current implementation in the code utilizes the MD5 and SHA1 hash algorithm, which is considered weak and vulnerable…
-
## Features
- [ ] Better hashing algorithms
- [ ] Automata-based fuzzy searching algorithms
## Breaking naming and organizational changes
- [ ] Rename `edit_distance` to `levenshtein_distanc…
-
The Keras has provided high level library functions for deep learning, however, it didn't provide any connectors to the database. As Caffe provided standard database usage for dataset preprocessing,
…
-
**What tool do you want?**
Example: Argon2 Hash Generator & Verifier
**Describe the solution you'd like**
Argon2 is a cryptographic [hash](https://www.educative.io/edpresso/what-is-hashing)ing al…
-
It looks like SHA1 is the default hashing algorithm for `tpm2_hash`. Could we change this to SHA256 or anything that is not deprecated?
```
root@9ac55cfa586b:~/lab/chapter_D# tpm2_hash -o hash.txt…
-
Bazel now supports blake3 as a hashing algorithm. It'd be great if we could start using it with bazel-remote as it promises impressive perfomance boosts
-
### Search first
- [X] I searched and no similar issues were found
### Description
To comply with regional security requirements, namely the United States Federal Information Processing Standard (F…
-
**Problem**
The current blake3 crate leaves a lot of single core performance on the table for message sizes below 8 KiB.
Namely, it doesn't SIMD parallelize hashing for small messages.
As a P…
-
### Quick summary
Gravatar seems to now be using `sha256` hashing instead of `md5`.
Source https://docs.gravatar.com/general/hash/
Functions in WordPress like `get_avatar_data()` for example st…