Search Results for "secure hash algorithm" - Page 4

Showing 182 open source projects for "secure hash algorithm"

View related business solutions
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 1
    ALEPH-w

    ALEPH-w

    Data structures and Algorithms library

    ...It contains the main data structures: single and double lists, special arrays (dynamic and of bits), many types of trees: multitrees, binary search trees, avl, red-black, randomized, treaps, splay and other interesting types. Several types of hash tables are implemented: separated chaining, open adressing with linear probing and double function hash; this last one has a garbage colector mechanism that allows to free deleted entries. Dynamic linear hash tables are implemented too. The main algorithms on graphs are implemented in an easy way and with good performance features. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Cube26

    General Purpose A-Z Stream Cipher (C++ implementation)

    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Cube256

    General Purpose Stream Cipher and Crypto System

    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    PeaZIP-mod

    It's a fork of Free Zip software and Rar extractor by Giorgio Tani.

    PeaZip is a free archiver tool. The application provides an unified, natively portable, cross-platform file manager and archive manager GUI for many Open Source technologies like 7-Zip, FreeArc, PAQ, UPX. Create: 7Z, ARC, BZip/GZip, PEA, TAR, WIM, XZ, ZPAQ, ZIP files and more Open and extract 180+ file types: ACE, CAB, DEB, ISO, RAR, ZIPX and more Features of PeaZip includes extract, create and convert multiple archives at once, create self-extracting archives (sfx), split files,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5

    file digest

    A command-line utility for calculating and verifying file checksums.

    Digest is a command-line utility which can be used to calculate and verify checksums of any files, similar to md5sum or RHash, but using modern hash algorithms. Supported algorithms: BLAKE, BLAKE2, Grøstl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, Skein, SM3, Streebog, Whirlpool. Usage: digest [-c] <algorithm> <filename(s)> For example, if you want to calculate the checksums using skein512/256 algorithm, use this command: digest skein512/256 * > checksums.skein To verify the checksums: digest -c skein512/256 checksums.skein You can get a full list of supported algorithms and test the performance of different algorithms on your PC using the command: digest test <iterations> <filename> This will calculate hash sum of <filename> multiple times (number of times is specified by <iterations>) and output the results with precise timings. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    casync

    casync

    Content-addressable data synchronization tool

    ...Let's call this directory a "chunk store". At the same time, generate a "chunk index" file that lists these chunk hash values plus their respective chunk sizes in a simple linear array. The chunking algorithm is supposed to create variable, but similarly sized chunks from the data stream.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    PeaUtils

    File management utilities: split & join, secure delete, crc/hash

    Suite of file management utilities: split and join files, secure delete, verify checksum and hash values: CRC32. MD5, SHA1, SHA-256, SHA3 and more. Spin-off of PeaZip project.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 8

    Xamp

    This is Xamp, a secure and platform independend media player.

    This is Xamp, the next generation of a skinnable and platform independent media player which based on the Doppio media framework: https://sourceforge.net/projects/doppio. The player supports various pluggable video and audio formats. Xamp is primarily intend to run as a native executable but can also run as a Java player version working with Java 1.1 VM or above. To ensure the best user experience, the Java version of Xamp doesn't use the Java Media Framework, the high level part...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    Passwords generator for IAD devices, using 3 keys and a index. The result is a fixed lenght of alphabetic characters. The algorithm works with other 3 big fixed prime numbers. These 3 numbers define a family of passwords. Finally, it provides a guaranteed functional string to use in all variety of devices without rejects.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cloud-based help desk software with ServoDesk Icon
    Cloud-based help desk software with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • 10

    SALMON cipher

    Cryptographic PRNG

    ...There is also mild use of a portion of Salsa20/12 called a "quarter round function". The key schedule relies on SHA-2 (the standard hash function of the NSA.)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Password Keeper

    Password Keeper

    manage your passwords in a secure way

    ...Because if you use only one password everywhere and someone gets this password you have a problem... A serious problem. The thief would have access to your e-mail account, website, etc. Unimaginable. Password Keeper helps you to manage your passwords in a secure way. You can protect all your passwords with Password Keeper . You only have to remember one single master password to unlock the application when it starts only. your login and passwords are encrypted using the best and most secure encryption algorithm currently known (AES).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    TAG

    TAG

    A tool for metatranscriptome assembly using metagenome graph

    TAG is a tool for metatranscriptome assembly using de Bruijn graph of matched metagenome as the reference. TAG is an application of a reads mapping algorithm that we developed for mapping of short reads onto a de Bruijn graph of assemblies. A hash table of junction k-mers (k-mers spanning branching structures in the de Bruijn graph) is used to facilitate fast mapping of reads to the graph. We have shown that TAG helps to assemble substantially more transcripts from metatranscriptomic datasets that otherwise would have been missed or truncated because of the fragmented nature of the reference metagenome. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    AES256 Password manager Russian version

    Simple password manager in Russian

    Simple password manager that uses encryption AES 256. Translated into Russian. AES256 Password Manager (originally Encrypter) decoder is a text file that stores the passwords or other sensitive data is completely secure manner using encryption algorithm AES 256-bit. Official page http://xn--90abhbolvbbfgb9aje4m.xn--p1ai/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BF%D0%B0%D1%80%D0%BE%D0%BB%D0%B8/aes256-password-manager-%D0%BF%D1%80%D0%BE%D1%81%D1%82%D0%BE%D0%B9-%D0%BC%D0%B5%D0%BD%D0%B5%D0%B4%D0%B6%D0%B5%D1%80-%D0%BF%D0%B0%D1%80%D0%BE%D0%BB%D0%B5%D0%B9.html Autor twitter: https://twitter.com/mrkaban546
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Enigma

    Enigma

    Secure Striker Manager

    Copyright (C) 2016 Jonas Penno This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    LDWM: Hash-Based Signatures (draft-mcgrew-hash-sigs-02), PHP implementation of IETF pqcrypto algorithm specification
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Dev-C++ for Homeworks

    Orwell Dev-Cpp with author authentication for homeworks

    Orwell Dev-C++ with author authentication. Perfect for student homeworks, if you don't want your students to copy their homework files from others. Authenticated files are regular source files with student's name and a security hash added at the end. Any cheating attempt by copying in the files / changing name will invalidate the hash and can be detected by the teacher. In addition, paste in authenticated files is only allowed from one's own files. The CheckHash.exe tool checks the...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 17
    jPass - Cross-Platform Password Manager

    jPass - Cross-Platform Password Manager

    Compiled into a single .jar file. Tiny Password Manager. Portable

    I did not see a pre-built version of this software on the original developers Github project (https://github.com/gaborbata/jpass), so I am taking it upon myself to compile the releases as they come, so that others don't have to. --Description-- JPass is a simple, small, portable password manager application with strong encryption. It allows you to store user names, passwords, URLs and generic notes in an encrypted file protected by one master password. I will not add the source...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Gryptonite (formerly GPassword Manager)

    Gryptonite (formerly GPassword Manager)

    Simple but Powerful, Cross-Platform Password Management Utility

    ...Access your most-used passwords/URLs right out of a desktop tray icon. For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. Although the interface is simple and intuitive, the security is top-notch. It uses AES with CCM to secure and authenticate the data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Enigma_3

    A substitution-based encryption algorithm for binary data or text

    Enigma3 is a substitution-based encryption algorithm that can be applied to binary or text data and results in far greater security than traditional encryption. An electronic dictionary of words is employed and numeric codes are then assigned to each word within the dictionary. Communications are coded as a set of numeric codes which can then only be translated back into the original message by using the original coded dictionary. This is not an encryption method in the commonly...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Advanced Checksum Verifier Utility
    Advanced CVU is an open source GUI software for calculating checksum and verifying file integrity. Supported checksums: - MD5 (Message Digest 5) - SHA-1 (Secure Hash Algoritm) - SHA-256 (Secure Hash Algoritm) - SHA-512 (Secure Hash Algoritm) - CRC32 (Cyclic Redundancy Check) - Adler-32 (RFC 1950) Java Runtime Environment (JRE) 1.8 must be installed for proper running.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    HeaDDaCHe

    Hashed dynamic determinants for convex hulls

    Description: We propose and implement in C++ the hashed dynamic determinants scheme. This consists of efficient implementations of dynamic determinant algorithms and a hash table that stores intermediate results (matrices and determinants) in order to be used in subsequent steps of the algorithm. Related papers: V.Fisikopoulos, L.Peñaranda. Faster Geometric Algorithms via Dynamic Determinant Computation. In Algorithms – ESA 2012, Lecture Notes in Computer Science Volume 7501, 2012, pp 443-454.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Gryptonite

    Gryptonite

    Cross-platform encrypted password and file database

    ...Access your most-used passwords/URLs right out of a desktop tray icon. For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. It's not just easy to use, it's also highly secure. Security experts will be happy to know that it uses AES with CCM and has a solid security concept.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Diamond (DMD)

    Diamond (DMD)

    Diamond (DMD) is the digital wealth storage system.

    * 4.38 million total coins. * Cutting edge Grøstl algorithm. * Proof-of-Work block solving target time ~ 100 seconds. * Proof-of-Stake block solving target time ~ 100 seconds. * Very low transaction fee at 0.001. * Difficulty re-targets at every block. * Endless Hybrid Network Security. * Transaction Message technology. * Fast and secure transactions. * Provision for continuous promotion and development
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Cube Password Manager

    Cube Password Manager

    A secure and light-weight password manager

    ...Should you encounter a bug I will be glad to help, but I can't guarantee any major updates for it. UPDATE: Various improvements to the GUI, a new and much stronger encryption algorithm as well as a new login screen.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    SATURN cipher

    RNG for use in a stream cipher

    SATURN is now a fully-functional stream cipher. It is in active development. The underlying algorithm is SATURNrng, a cryptographically-secure random number generator. SATURNrng is seeded with a 480-bit key and a 480-bit nonce which then produces a random stream used to encrypt a plaintext.
    Downloads: 0 This Week
    Last Update:
    See Project