Search Results for "encryption algorithm java" - Page 4

Showing 1088 open source projects for "encryption algorithm java"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Photo and Video Editing APIs and SDKs Icon
    Photo and Video Editing APIs and SDKs

    Trusted by 150 million+ creators and businesses globally

    Unlock Picsart's full editing suite by embedding our Editor SDK directly into your platform. Offer your users the power of a full design suite without leaving your site.
    Learn More
  • 1
    Hashids

    Hashids

    A small PHP library to generate YouTube-like IDs from numbers

    ... is also shuffled based on salt. We need ids to be nice and friendly especially if they end up being in the URL. Therefore, the algorithm tries to avoid generating most common English curse words by never placing the following letters (and their uppercase equivalents) next to each other. There are no collisions because the method is based on integer to hex conversion. As long as you don't change constructor arguments midway, the generated output will stay unique to your salt.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2

    EasyJCE

    Provides encryption & password hashing for your app or Hibernate POJOs

    EasyJCE provides an easy to use interface for encrypting, decrypting, and hashing data for transmission or storage using the Java Cryptographic Extension (JCE). A set of Hibernate user types is included to transparently integrate encryption into the data layer in a JPA/Hibernate environment, ensuring data is persisted in its encrypted form while obscuring encryption and decryption logic from application code. EasyJCE supports most algorithms implemented for the JCE, including those provided...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Credit Card Vault

    Credit Card Vault

    Just an app I developed for my university course

    Credit Card Vault is a simple app that allows you to store the credit card information encrypted with the 3DES encryption algorithm in CBC mode on an Android device. I originally developed this app for my university course, but I also decided to post it on GitHub on Sourceforge. This application is made for educational purposes only. Despite having well-functioning cryptographic features, it may not be reliable. This application is provided with no warranty or guarantees of any kind. Use...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    FileHashler

    FileHashler

    cross-platform (Java) file encryption and archiving tool

    Java based API (library) and console utility for cross-platform file and directory encryption and archiving. Encrypts single files up to 9.2 EB length. Directories can be encrypted as sets of single files in a single action. Uses Twofish (CBC) and SHA-256. Security level is strong and benefits from the PWS3 (Password Safe) encrypted file format. The level can be lowered to 128-bit key-length (normally 256).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    Open Stienolism Project

    Open Stienolism Project

    Open Stienolism Federated Networking + Resources + Peering Systematic

    ... as the new Manette.* PMCROE which TLA as an cipher algorithm stands for: Polyphasic Mutimultifacet Cross Rail Organic Encryption --> which is in effect with the ChronolabsCoop-Stiens.* for all old fashion Secure Functions, we offer a range of tools and abstraction executables to assist with stien, you can on out: https://stien.sourceforge.io --> mount stien files directly over the timing bell, which the signer with an online signal to sourceforge.net can also do this; when we make this all available!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Textcryption

    Textcryption

    Tiny application which allows encrypting basic text.

    Application which allows encrypting text. It is encrypted using own libraries. I think it is a very strong way to encrypt, specially if the text has more than 1 KB. The application reads encrypted bytes from disk, and writes encyrpted bytes to disk, so it never is saved in the hard disk decrypted. JDK-17 compatibility
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    SCADA plugin

    SCADA plugin

    SCADA plugin for JMP (demo)

    - SCADA plugin for JMP is designed for remote hardware monitoring. - JMP nodes must be running on all machines involved, i.e. both "polling" and "polled" machines. - Machines communicate over custom protocol on top of Java RMI with encryption. - The "field-level" machine gets the data from PLCs via Modbus. A few other industrial protocols will be added soon. - SCADA graphical output and polling parameters are set via web-interface. See the Wiki tab for detailed information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Underscore Backup

    Underscore Backup

    Private, secure backups in the cloud.

    Private, secure backups in the cloud of any size with minimal resource usage exactly the way you want them. Your data is encrypted by default using encryption keys only available to you and before leaving your network. Backed up data is signed to ensure protection from tampering. Data can be stored with any amount of redundancy and even multiple backup locations simultaneously. No information about the contents of your data is saved in any backup location. Only you can download and access...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    AngClust

    AngClust: Angle-based feature clustering for time series

    Citation: Aimin Li, Siqi Xiong, Junhuai Li, Saurav Mallik, Yajun Liu, Rong Fei, Hongfang Zhou, Guangming Liu. AngClust: Angle Feature-Based Clustering for Short Time Series Gene Expression Profiles. January 2022. IEEE/ACM transactions on computational biology and bioinformatics / IEEE, ACM. DOI: 10.1109/TCBB.2022.3192306 Full text: https://ieeexplore.ieee.org/document/9833353/ https://pubmed.ncbi.nlm.nih.gov/35853049/ Highlights * We proposed a novel clustering algorithm based...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    FractalImageCompression

    FractalImageCompression

    Java Fractal Image Compression based on Delaunay triangulation

    Implementation of the algorithm of the paper: "Fractal image compression based on Delaunay triangulation and vector quantization" It is a Fractal compression algorithm, based on relationships between regions of the image (in this case triangles), rather than in explicitly the pixel values themselves. Video demo: https://frojasg1.com:8443/resource_counter/resourceCounter?operation=countAndForward&url=https%3A%2F%2Ffrojasg1.com%2Fdemos%2Faplicaciones%2FfractalCompressor...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    JVerifier An hash code verifier JVerifier is a command line application that verify checksums from a GNU-style file. Source code available on https://github.com/davidesestiliwork/JVerifier2 Usage: param 1: file name, param 2: algorithm, param 3: baseDir Example: java -jar JVerifier2.jar SHA1SUMS SHA-1 /home/davide Note: this program requires GnuPG to work properly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Corona-Warn-App Server

    Corona-Warn-App Server

    Backend implementation for the Apple/Google exposure notification API

    ... the implementation of the server for encryption keys for the Corona-Warn-App. The Corona-Warn-App is an app that helps trace infection chains of SARS-CoV-2 (which can cause COVID-19) in Germany. The app is based on technologies with a decentralized approach and notifies users if they have been exposed to SARS-CoV-2. Transparency is key to both protecting the app's end-users and encouraging adoption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Ragna Scribe

    Ragna Scribe

    Multi-dimensional text editor in Java

    Ragna Scribe is a versatile text editor which can hold multiple documents at the same time and each document organises a set of articles in a tree order. The documents are based on the Treepad 2.7 format. They can be kept encrypted on a high-standard security level (uses the file format of Password Safe). Editor has data security measures like file mirroring and history files. Try it out!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    SimpleDCS
    SimpleDCS is a Distributed Control System made easy - fully configurable both on hardware and a software level. Experimental stage (alpha)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    The program allows you to generate the hashes with the chosen algorithm (MD2, MD5, SHA-1, SHA-256, SHA-384 and SHA-512) of a single file or an entire folder (you can choose to scan the folder recursively or not recursively). It supports drag and drop of files and folders. The hash can be exported to text files. Compiled with openjdk 8. Usage: param 1: exclude symbolic links (0 or 1) [mandatory], param 2: exclude hidden files (0 or 1) [mandatory], param 3: folders to exclude [optional...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    MentDB Weak

    MentDB Weak

    Mentalese Database Engine

    Welcome to MentDB (Mentalese Database). The platform provides tools for AI, SOA, ETL, ESB, database, web application, data quality, predictive analytics, chatbot ..., in a revolutionary data language (MQL). The server is based on a new generation of AI algorithm, and on an innovative SOA layer to reach the WWD. Mentalese is the language of thought structuring the human brain. This language is able to accommodate different common languages and allows autonomy in a machine. WWD literally...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Empact Foundation Class Library

    Cross-platform C++ library for use as a default application framework.

    A mature cross-platform C++ library for use as a default application framework. Features include: * Threading & synchronization * Socket programming: SSL, NanoMsg & ZMQ * File I/O utilities: zlib, ini, yaml * Native Database access: MySQL, SQLite, BerkleyDB, Postgre, REDIS and ODBC * Built-in mini XML parser; optional EXPAT, LIBXML and MSXML support * Network protocol stack: HTTP, FTP, SMTP, POP3, SOAP, XMLRPC * Scripting languages: Perl, Python, JavaScript, VBScript, Java, Lua, TCL...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    miRDeep*

    miRDeep*

    MiRDeep*

    Please cite: An, J., Lai, J., Lehman, M.L. and Nelson, C.C. (2013) miRDeep*: an integrated application tool for miRNA identification from RNA sequencing data. Nucleic Acids Res, 41, 727-737. We will create index for you if you tell us your interested species (j.an@qut.edu.au). download command line version "MDS_command_line_Vxx.zip" clicking "Browse All Files" please find miRPlant in sourceforge for plant miRNA prediction.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Conversations

    Conversations

    The very last word in instant messaging

    Conversations is an open source Jabber/XMPP client for Android, designed to provide a unique and more freeing mobile messaging experience. XMPP is a federated protocol that can work with every XMPP server out there, giving you the freedom to choose a trustworthy server for yourself while still being able to chat with contacts from other servers. All communications are TLS encrypted and Conversations offers to enable one of two state of the art end-to-end encryption mechanisms, so you can...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    jasypt-spring-boot

    jasypt-spring-boot

    Jasypt integration for Spring boot

    Jasypt Spring Boot provides Encryption support for property sources in Spring Boot Applications. There are 3 ways to integrate just-spring-boot in your project. And encryptable properties will be enabled across the entire Spring Environment (This means any system property, environment property, command line argument, application.properties, yaml properties, and any other custom property sources can contain encrypted properties) Jasypt uses an StringEncryptor to decrypt properties. For all 3...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 21
    mystic-crypt is designed as a Java library that can be used for simple and complex encryption and decryption. The source code for the library is available under https://github.com/astrapi69/mystic-crypt For demonstration what the library can do there is a graphical client: The source code for the ui is available under https://github.com/astrapi69/mystic-crypt-ui
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    badpi-cyphering

    symetric crypto based on PI calculation.

    encryption/decryption/key generation/CRC. You may use as a library (header *.hpp files)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    File Encrypter

    File Encrypter

    Encrypt your files fast and for free!

    ... by transforming the contents into a scrambled format using a secure encryption algorithm. File Decryption: Encrypted files can be decrypted effortlessly using the same encryption key that was used for encryption. This feature ensures that authorized users can access and restore the original contents of the files. Strong Encryption Algorithms: The application employs robust encryption algorithms, such as AES (Advanced Encryption Standard), to provide a high level of security for the encryption.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    QScript

    QScript

    Expression and algorithm evaluator (built with Java)

    ...-UNITL). All the commonly used functions found in Java's Math class are implemented and can easily be extended with user defined functions. Although the download is packaged as a Processing library it does not require Processing, in fact QScript has no third party software dependencies only needing Java.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    Twinkle

    Twinkle

    Twinkle is an open-source text editor.

    Twinkle is an open source text editor that saves the documents in an encrypted form.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.