Top 20 NuGet hash Packages

Provides modern cryptographic algorithm implementations for .NET based on libsodium. Commonly Used Types: NSec.Cryptography.Aegis256 NSec.Cryptography.Argon2id NSec.Cryptography.Blake2b NSec.Cryptography.Chacha20Poly1305 NSec.Cryptography.Ed25519 NSec.Cryptography.X25519
Argon2 Password Hasher written in C#. Uses Isopoh.Cryptography.Blake2 for hashing and Isopoh.Cryptography.SecureArray to protect sensitive data.
A fixed, enhanced and namespace compatible version of BCrypt.Net port of jBCrypt implemented in C#. It uses a variant of the Blowfish encryption algorithm’s keying schedule, and introduces a work factor, which allows you to determine how expensive the hash function will be, allowing the algorithm to...
Blake2 hash for sensitive data. Uses Isopoh.Cryptography.SecureArray to assure sensitive data gets wiped from RAM and, if the operating system allows, never gets written to disk.
An implementation of Blake2 for .NET that integrates with the standard crypto libraries
A .NET/Mono implementation of Bob Jenkins’ SpookyHash version 2. Offers 32-, 64- and 128-bit hashes of strings, char and byte arrays, streams and any type of object represented by an array of simple types.
Extensions to VelocityDB for efficient LINQ index/BTree queries, AzureSession file API usage with Microsoft Azure, import/export to/from CSV and JSON, Sync, GeoHash, Compressed Bitmap and RTree.
xxHash hash implementation for .NET
CryptSharp provides a number of password crypt algorithms - BCrypt, LDAP, MD5 (and Apache's htpasswd variant), PHPass (WordPress, phpBB, Drupal), SHA256, SHA512, and Traditional and Extended DES. Additionally it includes Blowfish, SCrypt, and PBKDF2 for any HMAC (.NET's built-in PBKDF2 implementatio...
THE CLASSES FROM THE CIPHERS PACKAGES DO NOT IMPLEMENT ANY CRYPTOGRAPHIC ALGORITHMS. They leverage the cryptographic algorithms implemented by the .NET cryptographic service providers. The Ciphers package helps in addressing a common application requirement for achieving con...
Generate YouTube-like hashes from one or many numbers. Use hashids when you do not want to expose your database ids to the user.
High performance and availability, scalable and very flexible pure .NET database. Using VelocityDB saves time and money for all software requiring reliable, high performance data persistence. Any .NET object can be efficiently persisted and retrieved within ACID transactional scope. The use of Veloc...
A fixed, enhanced and namespace compatible version of BCrypt.Net port of jBCrypt implemented in C#. It uses a variant of the Blowfish encryption algorithm’s keying schedule, and introduces a work factor, which allows you to determine how expensive the hash function will be, allowing the algorithm to...
Provides a HashAlgorithm implementation of the Murmur3 algorithm
Security, Cryptography, and Token Utilities
For Contact Us Please Send Mail Or Call To : Tel : +989301919109 Mail : [email protected]
DotNetCore.Security
Find the difference between two sequences of blobs on Azure Blob Storage
Components offering encryption and decryption operations based on standards such as RSA, ECC, AES, ChaCha, Poly1305, 3DES, JWS/JWE, PBKDF, and Rijndael through simple, easy-to-use, and intuitive APIs.
A simple password hashing based on top of Microsoft PBKDF2 with an easy to use interface