Top 20 NuGet hash Packages

This is all the assemblies of the Cuemon .NET Standard family.
Extensions to VelocityDB for efficient LINQ index/BTree queries, AzureSession file API usage with Microsoft Azure, import/export to/from CSV and JSON, Sync, GeoHash, Compressed Bitmap and RTree.
High performance and availability, scalable and very flexible pure .NET database. Using VelocityDB saves time and money for all software requiring reliable, high performance data persistence. Any .NET object can be efficiently persisted and retrieved within ACID transactional scope. The use of Veloc...
A secure cryptographic library
An implementation of Blake2 for .NET that integrates with the standard crypto libraries
Generate YouTube-like hashes from one or many numbers. Use hashids when you do not want to expose your database ids to the user.
THE CLASSES FROM THE CIPHERS PACKAGES DO NOT IMPLEMENT ANY CRYPTOGRAPHIC ALGORITHMS. They leverage the cryptographic algorithms implemented by the .NET cryptographic service providers. The Ciphers package helps in addressing a common application requirement for achieving con...
The Cuemon.Security assembly is a member of the Cuemon .NET Standard family and provides enhancements to the System.Security namespace.
Culture-invariant fluent checksum builder
Collection of utility classes migrated to NET Standard 2.0 from BOG.Framework
A fixed, enhanced and namespace compatible version of BCrypt.Net port of jBCrypt implemented in C#. It uses a variant of the Blowfish encryption algorithm’s keying schedule, and introduces a work factor, which allows you to determine how expensive the hash function will be, allowing the algorithm to...
Add support for major cryptographic standards to Apps: S/MIME, OpenPGP, TripleDES, TwoFish, RSA, AES, etc. Includes X.509 and OpenPGP certificate management.
A fixed, enhanced and namespace compatible version of BCrypt.Net port of jBCrypt implemented in C#. It uses a variant of the Blowfish encryption algorithm’s keying schedule, and introduces a work factor, which allows you to determine how expensive the hash function will be, allowing the algorithm to...
THE CLASSES FROM THE CIPHERS PACKAGES DO NOT IMPLEMENT ANY CRYPTOGRAPHIC ALGORITHMS. They leverage the cryptographic algorithms implemented by the .NET cryptographic service providers. This package extends vm.Aspects.Security.Cryptography.Ciphers with classes dependent on th...
THE CLASSES FROM THE CIPHERS PACKAGES DO NOT IMPLEMENT ANY CRYPTOGRAPHIC ALGORITHMS. They leverage the cryptographic algorithms implemented by the .NET cryptographic service providers. This package extends vm.Aspects.Security.Cryptography.Ciphers with classes dependent on System.Securit...
ImageDupLib offers several different perceptual hashing algorithms for detecting similar or duplicate images.
Blake2 hash for sensitive data
Provides a HashAlgorithm implementation of the Murmur3 algorithm
A high performance hash collection for use in a distributed hash table
A interface for implementing caching and storage of objects by their hash, a specialized key/value store for any object that implements `CryptLink.SigningFramework.IHashable`.