Open Source PHP Cryptography Software

Browse free open source PHP Cryptography Software and projects below. Use the toggles on the left to filter open source PHP Cryptography Software by OS, license, language, programming language, and project status.

  • Optimize every aspect of hiring with Greenhouse Recruiting Icon
    What’s next for many of us is changing. Your company’s ability to hire great talent is as important as ever – so you’ll be ready for whatever’s ahead. Whether you need to scale your team quickly or improve your hiring process, Greenhouse gives you the right technology, know-how and support to take on what’s next.
  • The Most Powerful And Capable Load Planning Software Icon
    The Most Powerful And Capable Load Planning Software

    Our state-of-the-art Load Optimization software is the program of choice for over 3,000 the Logistics Professionals

    MagicLogic Optimization Inc. provides software for every type of load planning, Cartonization and Palletization, based on twenty-five years of R&D. All software is developed in-house using powerful algorithms capable of meeting the most complex loading rules and requirements.
  • 1
    AUM CSPRNG & Stream Cipher

    AUM CSPRNG & Stream Cipher

    A minimal CSPRNG reflecting the Zen of cipher design

    AUM is an extremely fast, small-state, cryptographically secure pseudo-random number generator and stream cipher. AUM exhibits uniform distribution, mixes rapidly, has no detected bias, and comes in three variants: AUM16, with an internal state array of 16+4 32-bit words; AUM32, with an internal state of 32+4 words; and AUM64 with a 64+4-word state. The former permit seeding with a key of up to 512 or 1024 bits, the latter with a 2048-bit key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    This is a community effort to study and improve security of WPA protected WiFi networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Free Tiger

    Free fast implementation of tiger and the TTH algorithms

    Free Tiger aims to provide a fast C implementation of the tiger and TTH hash algorithms in order to provide a performing hasher. It also aims to provide pure implementations of tiger and when possible TTH in other languages for reference.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    "No more clear text passwords" is a project to stop the nonsense regarding passwords used in the login protocols of most Web 2.0 projects: they are sent in the clear, shamelessly, with absolutely no care for privacy, and without warning the users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Construction Management Software for subcontractors Icon
    Construction Management Software for subcontractors

    PLEXXIS is a subcontractor solution uniting project management, accounting, estimating, takeoff and mobile apps on a single tech stack.

    Plexxis serves subcontractors who seek elite team cohesion and performance. Coupling cloud construction management software, on-premise and hosted solutions, we unite operations, estimating, accounting and field apps on a single technology stack that enables live feedback between bidding, field and finance while in-house services drive continuous adoption.
  • 5
    OSN is an open source open protocol distributed social network. Public key cryptography makes the network resilient to spam. User profiles are based on FOAF XML and users can migrate their profile from one site of the federation to another.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This project includes: 1 A php linux extension to include encrypted php source files - c; 2 A command line linux application to encrypt/decrypt php source files - c; 3 A windows application to encrypt/decrypt php source files - builder c++
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to efficiently cipher text of arbitrary length or files of any size or type. Use it with confidence. To achieve complete one-on-one privacy, SES traverses several levels en route to its output. The more words in your key-phrase, the more layers of encipherment SES applies. It is part Vigenere, part onetime pad, part cryptographic hash, not to mention the essential scrambler element, each component driven by ISAAC, with all key-derivation and stretching relying on Keccak in 512-bit configuration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    UnityCA is a Certificate Authority "front end" based on the Community-Oriented CA (COCA) model, which was primarily developed for non-profit "free CAs." Organizational and end-user interfaces provide trusted web management of the installed CA (eg ElyCA).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    myencoder is a php extension used for encrypt php source code
    Downloads: 0 This Week
    Last Update:
    See Project
  • The Future of Union Management and Benefits Administration Software Is Here Icon
    The Future of Union Management and Benefits Administration Software Is Here

    For unions interested in a powerful union management system

    Introducing the sole contemporary, cloud-based platform for unions. Our comprehensive suite comprises two fully customized systems dedicated to union management and benefits administration, seamlessly integrated with a cutting-edge website and secure member portal.
  • 10
    WebToken is a cryptographic system to authenticate users through a 2FA (Two-Factor Authentication) using OTP (One Time Password).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next