Hash mode interface to the Keccak code package. This program illustrates the use of the Keccak permutation. Usage is much more than a hash function. The NIST compatible settings are subject to change when they publish FIPS PUB 180-5. I wrote this program when evaluating the permutation and developing tree hashing for the Intel(R) MIC architecture.
Process inefficiencies are a drain on any business, no matter how big or small, so speeding up your workflow is an absolute essential. Download the FREE Top 5 Process guides to better understand how workflow automation looks within each line of business like IT, Sales, Finance, and Human Resources. Remember, just because you’ve established a process within your organization or department, it doesn’t mean that it’s working as well as it could be.
Website | https://sha3sumandthensome.sourceforge.io/ |
Tags | Cryptography |
License | GNU General Public License version 3.0 (GPLv3) |
Platform | Linux Windows |
Features |
|