Search Results for "secure hash algorithm" - Page 6

Showing 182 open source projects for "secure hash algorithm"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1

    sderase

    secure data erase tool for win32

    sderase is SECURE DATA ERASE tool. small,full functional,green,fast,secure and stable. sderase can erase file,folder and disk partition's free space securely. only for windows platform. support fill file's content with zero byte,random data. support US DOD 5220.22-M standard,and Gutmann algorithm. mutithread supported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    AllCheckSumer

    AllCheckSumer

    Calculate and compare files with 3 different file signature algorithms

    AllCheckSumer is a handy tool for computer forensics and is helpful for investigators to search throughout a computer’s file system for a bad hash specified by the investigator. The tool will search throughout a location, specified by the investigator. It can be either an entire file system or a specific folder, and create a hash set with the following file signature algorithms: • MD5 (Message-Digest Algorithm v. 5) • SHA-1 (Secure Hash Algorithm v. 1) • CRC (Cyclic Redundancy Check)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Detailed Presentation of the GROESTL hash function, finalist to the SHA-3 competition organized by the NIST to decide which cryptographic hash algorithm will replace the famous SHA-2.I analyze and present the candidate algorithm I bet on since the beginning of the competition.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A portable in-place bitwise binary Fredkin trie algorithm which allows for near constant time insertions, deletions, finds, closest fit finds and iteration. Is approx. 50-100% faster than red-black trees and up to 20% faster than O(1) hash tables.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cloud-based help desk software with ServoDesk Icon
    Cloud-based help desk software with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • 5
    Corruptir

    Corruptir

    Corrupt images for an interesting effect.

    ...Has 6 modes so far: 1, 2, and 3, which are effects that stay the same. Given mode, which bases it's destruction on a given string. Random, if you don't like 1/2/3. "Secure", which corrupts with a modified Random algorithm several times, making it unrecognizable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Hash Monster
    A versatile gui and console application capable of generating and comparing hashes using a variety of popular hashing libraries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Hash Codes
    Program can hash data from keyboard, file or CD/DVD by Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 8

    FactHash

    Factorial Hashing Function

    ...I hold no guarantee of the security of this algorithm, USE AT YOUR OWN RISK. I have had no 3rd party analysis done on the algorithm to date, but research is welcome, and a challenge is even provided in CHALLENGE.txt.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Rcrypto

    Rcrypto

    Encryption Tool

    Rcrypto is the encryption and decryption software for windows XP,vista and 7 to keep your data secure from unauthorized users. It uses the highly secure algorithm to encrypt every byte of the file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 10
    I Have The Power

    I Have The Power

    GUI for illustrating the mathematics of large hash algorithms

    A cross platform (Windows\Linux) graphical interface for demonstrating the numerical enormity of large hash algorithms like MD5 (128 bits), SHA1 (160 bits), SHA256 (256 bits) and SHA512 (512 bits). Useful for demonstrations to non-technical audiences such as jury panels, school children, students and so on by converting the scientific notation of the algorithm to "1 in 340 billion....".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Skein 512-512 hash algorithm implemented in Bash. Prepare to have your CPU pegged, and for simple hash calculations to take around 10 seconds. Hit the Home tab for details.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    eCryptfs Parser is a GUI for Linux and Windows that recursively parses the headers of every eCryptfs file found in a given directory. It will tell you what encryption algorithm was used, the original filesize, signature used etc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    TinyCrypt is a simple secure program for encrypting files. The core encryption code is only 76 lines of C code, based on the well known ARC4-D(768) algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This is a tool used to encrypt, hash or sign with various algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    TBFAA/encoder
    A program that encrypts multiple files. It uses new encryption algorithms, such as a Three-Block Feistel chiper, ArchFurry's algorithm and a new hash function. Licensed under the ISC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Compiled by Alessandro de Oliveira Faria (a C implementation of MD6). The algorithm is a cryptographic hash developed at MIT by a team led by Ronald Rivest in response to the call for proposals for a SHA-3 cryptographic hash algorithm by the NIST;
    Downloads: 3 This Week
    Last Update:
    See Project
  • 17
    Binary Hashing Method 2 is the latest installment in the Binary Hashing Method hashing algorithm. This program is designed to securely create a digest of information, in an unpredictable and secure way.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    MUTE is a secure, anonymous, distributed communications framework. Node-to-node connections are encrypted, and messages are routed using an ant-inspired algorithm. The first MUTE-based app supports anonymous file sharing.
    Downloads: 69 This Week
    Last Update:
    See Project
  • 19
    Secure Hash Algorithm Version 2 (SHA-256)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    EZ Encryption
    This simple encryption program, allows you to virtually encrypt all documents and even decrypt them back using the secure XOR encryption algorithm. This program is designed for beginners who know little about encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    An application presents safe and secure Chat through a certificated point which is the Server. It supports authentication of users using passwords and a simple encryption algorithm to exchange a unique key between the Server and each Client.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Hash Sort is a form distribution sorting algorithm when tested it has an O(N) characteristics in most cases. The trade off is memory for space. Here is a very fast optimized recursive implementation of the hash sorting algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    This WebOS application generates RFC 2289 standard compliant one-time passwords. It supports the MD4 and MD5 message-digest algorithms as well as the SHA-1 hash algorithm and can be used with challenge-response OTP systems such as OPIE and S/KEY.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    This is a more secure file encryption program which uses SERPENT cipher and WHIRLPOOL+SHA-256 hash functions in key creation and for integrity checking.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    This software is used to delete files securely in the Linux operating system using low level system calls.
    Downloads: 0 This Week
    Last Update:
    See Project