Click here to Skip to main content
14,931,331 members
Everything / Hash

Hash

hash

Great Reads

by Marc Clifton
An interactive demo of how audit and consistency proofs work
by phil.o
This article describes a C# implementation of the sponge construction and its use for SHA-3 hashing operations.
by Vasil Trifonov
Compare two DLL files programmatically using hash
by Rion Williams
Generating an MD5 hash from a string using LINQ.

Latest Articles

by Sanmayce
Brutally optimized hash function for general table lookups
by DiponRoy
Create hash and compare
by Mahsa Hassankashi
Best approach for having more secure channel to transfer user information throughout the web
by Member 13737597
This article shows how Windows generates IP header's ID field

All Articles

Sort by Score

Hash 

Please Sign up or sign in to vote.
13 Mar 2017
Marc Clifton
An interactive demo of how audit and consistency proofs work
Please Sign up or sign in to vote.
29 Jan 2018
phil.o
This article describes a C# implementation of the sponge construction and its use for SHA-3 hashing operations.
Please Sign up or sign in to vote.
3 Apr 2019
Mahsa Hassankashi
Best approach for having more secure channel to transfer user information throughout the web
Please Sign up or sign in to vote.
14 Feb 2016
adriancs, Taylor Hornby
Securing Password by Hashing with Salt
Please Sign up or sign in to vote.
11 Feb 2014
Uzi Granot
This project will give you the tools needed to compress and decompress files using the Deflate method of compression, and to read and write standard Zip files.
Please Sign up or sign in to vote.
19 Jun 2012
Dominik Reichl
CSHA1 - A C++ class implementation of the SHA-1 hash algorithm
Please Sign up or sign in to vote.
16 Nov 2017
raddevus
Get complete source that creates a solution so users never have to memorize, type or make up a password again. I've open-sourced the entire code base to the apps on all platforms(iOS,Android, WinForm, Web)
Please Sign up or sign in to vote.
23 Dec 2015
Shvetsov Evgeniy
Helper functions to deal with the individual bits & digits, hashing and other
Please Sign up or sign in to vote.
30 Oct 2019
Sanmayce
Brutally optimized hash function for general table lookups
Please Sign up or sign in to vote.
3 Jun 2016
raddevus
A novel approach to generate a secure way to login that doesn't require the user to ever memorize a password again. This method can be used with any web site, program, etc. and creates a more secure password than other methods.