A PBKDF2 implementation in Elm
SHA256 and SHA228 cryptographic hashes Elm.
Fast elm/bytes based sha256 and sha512
SHA cryptographic hash functions.
Shamir's Secret Sharing algorithm over GF(256)
Compute HMAC with SHA-2 hash functions or use SHA-2 directly.
Compute HMAC with SHA-1 hash function
Would you like to use Elm for real-world projects?
📢 My book
Practical Elm
skips the basics and gets straight into the nuts-and-bolts of building non-trivial apps.
🛠 Things like building out the UI, communicating with servers, parsing JSON, structuring the application as it grows, testing, and so on.