Hash & Encryption Toolkit
Cryptographic primitives at the edge
Compute hashes, HMAC signatures, bcrypt/Argon2 password hashes, and generate cryptographically-secure tokens — all in under 5ms at the network edge.
- POST
/v1/hash - POST
/v1/hmac - POST
/v1/verify - POST
/v1/token - GET
/v1/health
- Password hashing with bcrypt / Argon2
- Data integrity verification
- Secure API key generation
- HMAC request signing