applied_crypto_2021_fall VS iavl

Compare applied_crypto_2021_fall vs iavl and see what are their differences.

applied_crypto_2021_fall

problem sets for CS-GY 6903 Applied Cryptography (by oconnor663)

iavl

Merkleized IAVL+ Tree implementation in Go (by cosmos)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
applied_crypto_2021_fall iavl
4 1
39 407
- 0.7%
1.8 8.2
over 2 years ago 3 days ago
Python Go
- Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

applied_crypto_2021_fall

Posts with mentions or reviews of applied_crypto_2021_fall. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-02-07.
  • Show HN: SHA-256 explained step-by-step visually
    5 projects | news.ycombinator.com | 7 Feb 2022
    Applied Cryptography (CS-GY 6903) at NYU Tandon. You can find all our programming problem sets in the same repo: https://github.com/oconnor663/applied_crypto_2021_fall.
  • Hashing Is Not Encryption
    1 project | news.ycombinator.com | 9 Jan 2022
    (shameless plug) If you want to start by doing your own implementation of SHA-256, you can take a look at one of my assignments :) https://github.com/oconnor663/applied_crypto_2021_fall/tree/...
  • The Pinouts Book
    1 project | news.ycombinator.com | 30 Dec 2021
    > IIRC SHA256 outputs the full state so some types of length extension attack are still possible (though massively less _practical_ than against MD5)

    I'm not aware of any differences between the length extension attack on MD5 vs the one on SHA-256. As far as I know, it works the same way on both. Here's an assignment I did on the SHA-256 version if you want a deep dive: https://github.com/oconnor663/applied_crypto_2021_fall/tree/...

    It's possible you're thinking about finding collisions? It's true that this is much easier for MD5 than for SHA-256.

iavl

Posts with mentions or reviews of iavl. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-02-07.

What are some alternatives?

When comparing applied_crypto_2021_fall and iavl you can also consider the following projects:

hashcat - World's fastest and most advanced password recovery utility

sha256-animation - Animation of the SHA-256 hash function in your terminal.

tendermint - ⟁ Tendermint Core (BFT Consensus) in Go

lnd - Lightning Network Daemon ⚡️

image-stego - 🏞 Steganography-based image integrity - Merkle tree nodes embedded into image chunks so that each chunk's integrity can be verified on its own.