-
### Describe your idea
~~The Cryptographic Accelerator would provide CC computers with common cryptographic algorithms done on the Java side which is faster than implementing them in Lua, possible …
-
**Description:**
Right now, when we want to handle passwords in a Ballerina service, there's no inbuilt option that uses salt/pepper. Hashing passwords using a pure hash function (like SHA512, SHA 25…
IMS94 updated
1 month ago
-
Please check if there is any problem with using weak cryptographic algorithms.
The current implementation in the code utilizes the MD5 and SHA1 hash algorithm, which is considered weak and vulnerable…
-
## Features
- [ ] Better hashing algorithms
- [ ] Automata-based fuzzy searching algorithms
## Breaking naming and organizational changes
- [ ] Rename `edit_distance` to `levenshtein_distanc…
-
The Keras has provided high level library functions for deep learning, however, it didn't provide any connectors to the database. As Caffe provided standard database usage for dataset preprocessing,
…
-
I'm trying to decrypt a JWE with a symmetric key, with`enc=A256GCM` and `alg=A256KW`, following the documentation I get something like this:
```python
# make JWK
aes_key_bytes = # raw bytes of t…
-
## Description
Create a backend endpoint that allows users to reset their password using a secure token received via email. The endpoint should validate the token, accept the new password, and upda…
-
## Description
Create a backend endpoint that allows users to reset their password using a secure token received via email. The endpoint should validate the token, accept the new password, and upda…
-
- #536 implemented a loadbalancer feature with only roundrobin algorithm.
- After #556 we should have a solid code base to easily implement different algorithms per route.
We want to have some o…
-
Since last time JS support was tried there have been improvements to the JS implementation of `Int` and `Long` to work "as expected" with regards to overflow. See:
https://kotlinlang.org/docs/js-to…