cryptonite-0.13: Cryptography Primitives sink

LicenseBSD-style
MaintainerVincent Hanquez <vincent@snarc.org>
Stabilityexperimental
Portabilityunknown
Safe HaskellNone
LanguageHaskell2010

Crypto.Hash.Algorithms

Contents

Description

Definitions of known hash algorithms

Synopsis

Documentation

hash algorithms

data Blake2s_224 Source

Blake2s (224 bits) cryptographic hash algorithm

Constructors

Blake2s_224 

data Blake2sp_224 Source

Blake2sp (224 bits) cryptographic hash algorithm

Constructors

Blake2sp_224 

data Blake2s_256 Source

Blake2s (256 bits) cryptographic hash algorithm

Constructors

Blake2s_256 

data Blake2sp_256 Source

Blake2sp (256 bits) cryptographic hash algorithm

Constructors

Blake2sp_256 

data Blake2b_512 Source

Blake2b (512 bits) cryptographic hash algorithm

Constructors

Blake2b_512 

data Blake2bp_512 Source

Blake2bp (512 bits) cryptographic hash algorithm

Constructors

Blake2bp_512 

data MD2 Source

MD2 cryptographic hash algorithm

Constructors

MD2 

data MD4 Source

MD4 cryptographic hash algorithm

Constructors

MD4 

data MD5 Source

MD5 cryptographic hash algorithm

Constructors

MD5 

data SHA1 Source

SHA1 cryptographic hash algorithm

Constructors

SHA1 

data SHA224 Source

SHA224 cryptographic hash algorithm

Constructors

SHA224 

data SHA256 Source

SHA256 cryptographic hash algorithm

Constructors

SHA256 

data SHA384 Source

SHA384 cryptographic hash algorithm

Constructors

SHA384 

data SHA512 Source

SHA512 cryptographic hash algorithm

Constructors

SHA512 

data SHA512t_224 Source

SHA512t (224 bits) cryptographic hash algorithm

Constructors

SHA512t_224 

data SHA512t_256 Source

SHA512t (256 bits) cryptographic hash algorithm

Constructors

SHA512t_256 

data RIPEMD160 Source

RIPEMD160 cryptographic hash algorithm

Constructors

RIPEMD160 

data Tiger Source

Tiger cryptographic hash algorithm

Constructors

Tiger 

data Keccak_224 Source

Keccak (224 bits) cryptographic hash algorithm

Constructors

Keccak_224 

data Keccak_256 Source

Keccak (256 bits) cryptographic hash algorithm

Constructors

Keccak_256 

data Keccak_384 Source

Keccak (384 bits) cryptographic hash algorithm

Constructors

Keccak_384 

data Keccak_512 Source

Keccak (512 bits) cryptographic hash algorithm

Constructors

Keccak_512 

data SHA3_224 Source

SHA3 (224 bits) cryptographic hash algorithm

Constructors

SHA3_224 

data SHA3_256 Source

SHA3 (256 bits) cryptographic hash algorithm

Constructors

SHA3_256 

data SHA3_384 Source

SHA3 (384 bits) cryptographic hash algorithm

Constructors

SHA3_384 

data SHA3_512 Source

SHA3 (512 bits) cryptographic hash algorithm

Constructors

SHA3_512 

data Skein256_224 Source

Skein256 (224 bits) cryptographic hash algorithm

Constructors

Skein256_224 

data Skein256_256 Source

Skein256 (256 bits) cryptographic hash algorithm

Constructors

Skein256_256 

data Skein512_224 Source

Skein512 (224 bits) cryptographic hash algorithm

Constructors

Skein512_224 

data Skein512_256 Source

Skein512 (256 bits) cryptographic hash algorithm

Constructors

Skein512_256 

data Skein512_384 Source

Skein512 (384 bits) cryptographic hash algorithm

Constructors

Skein512_384 

data Skein512_512 Source

Skein512 (512 bits) cryptographic hash algorithm

Constructors

Skein512_512 

data Whirlpool Source

Whirlpool cryptographic hash algorithm

Constructors

Whirlpool