Latest version: v0.6.0
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
A simple, time-tested, family of random hash functions in Python, based on CRC32 and xxHash, affine transformations, and the Mersenne Twister.
No known vulnerabilities found