Browser Extension

Works

Toolbox

A toolbox that bundles multiple utilities so you can reach the tools you need quickly.

Coin Space

Track live prices across OKX, Binance, and CoinEx—add markets and alerts the way you like.

Warmer New Tab

A clean, polished new tab page that makes opening the browser a little nicer every time.

TradeSignal Pro

Smart buy and sell hints powered by technical indicators—trading ideas for your reference only.

CoinTab New Tab

A personalized new tab for crypto fans: markets, sites, HD wallpapers, P&L tracking, and alerts in one dashboard.

Hashing

MD5

MD5 is a widely used hash function. It's been used in a variety of security applications and is also commonly used to check the integrity of files

SHA1

The SHA hash functions were designed by the National Security Agency (NSA). SHA-1 is the most established of the existing SHA hash functions, and it's used in a variety of security applications and protocols. Though, SHA-1's collision resistance has been weakening as new attacks are discovered or improved.

SHA224

In February 2004, a change notice was issued for FIPS PUB 180-2 to include an additional variant SHA-224, which was defined to comply with the key length required for dual-key 3DES

SHA256

SHA-256 is one of the four variants in the SHA-2 set. It isn't as widely used as SHA-1, though it appears to provide much better security.

SHA384

The five algorithms of the SHA family, SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512, were designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). It's a U.S. government standard. The latter four are sometimes called SHA-2 together.

SHA512

SHA-512 is largely identical to SHA-256 but operates on 64-bit words rather than 32.

SHA3

SHA-3 is the winner of a five-year competition to select a new cryptographic hash algorithm where 64 competing designs were evaluated.

RIPEMD160

RIPEMD-160 is a modified version of MD4 that generates 20-byte digest values and is almost as secure as SHA-1 (note that the SHA-1 standard does not say how the K value is determined, which is very suspicious). RIPEMD-160 can be thought of as two MD4 computates in parallel, and if two threads are used, the performance will not be much different.

HmacMD5

Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.

HmacSHA1

Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.

HmacSHA224

Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.

HmacSHA256

Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.

HmacSHA384

Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.

HmacSHA512

Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.

HmacRIPEMD160

Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.

PBKDF2

PBKDF2 is a password-based key derivation function. In many applications of cryptography, user security is ultimately dependent on a password, and because a password usually can't be used directly as a cryptographic key, some processing is required. A salt provides a large set of keys for any given password, and an iteration count increases the cost of producing keys from a password, thereby also increasing the difficulty of attack.