Search Results for "encryption algorithm java" - Page 7

Showing 1092 open source projects for "encryption algorithm java"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • 1
    Crispy Synced Notes

    Crispy Synced Notes

    A note taking program with WebDAV sync

    ...Features: - group notes and images in a tree structure (using folders) - can work on any directory on your machine - technically works like a file browser with inline text editing - synchronizes with any WebDAV server (optionally using SSL/TLS) - allows one-way and two-way synchronization - allows to encrypt your files locally and remote using AES256 - multi language support You can obtain the full source code at: https://crispy-cow.de/git/CrispySyncNote.git Latest changes: 2.1.0: Updated for Java 9 and up 2.0.2: Added more UI translation, updated greek language (thanks to geogeo) 2.0.1: Bugfix: Sync state is now copied when duplicating workspace due to change in encryption settings
    Downloads: 9 This Week
    Last Update:
    See Project
  • 2
    MyCAT

    MyCAT

    Active, high-performance open source database middleware

    MyCAT is an Open-Source software, “a large database cluster” oriented to enterprises. MyCAT is an enforced database which is a replacement for MySQL and supports transaction and ACID. Regarded as MySQL cluster of enterprise database, MyCAT can take the place of expensive Oracle cluster. MyCAT is also a new type of database, which seems like a SQL Server integrated with the memory cache technology, NoSQL technology and HDFS big data. And as a new modern enterprise database product, MyCAT is...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    shadowsocks-libev

    shadowsocks-libev

    Bug-fix-only libev port of shadowsocks

    Shadowsocks-libev is a lightweight secured SOCKS5 proxy for embedded devices and low-end boxes. Shadowsocks-libev is written in pure C and depends on libev. It's designed to be a lightweight implementation of shadowsocks protocol, in order to keep the resource usage as low as possible. Snap is the recommended way to install the latest binaries. You can build shadowsocks-libev and all its dependencies by script. The latest shadowsocks-libev has provided a redir mode. You can configure your...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Ank Zipper

    Ank Zipper

    A free and easy-to-use password protected file archiver

    Ank Zipper provides you with a lightweight, Java-based application designed to provide security to your documents. Ank Zipper can compress both files and folders and create password-protected archives, in order to prevent unauthorized access to important files. Additionally, it can be used for extracting or simply browsing ZIP files.It includes AES(Advanced Encryption Standard) algorithm to encrypt/decrypt file(s).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Level Up Your Cyber Defense with External Threat Management Icon
    Level Up Your Cyber Defense with External Threat Management

    See every risk before it hits. From exposed data to dark web chatter. All in one unified view.

    Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
    Try for Free
  • 5
    Open Source Data Quality and Profiling

    Open Source Data Quality and Profiling

    World's first open source data quality & data preparation project

    This project is dedicated to open source data quality and data preparation solutions. Data Quality includes profiling, filtering, governance, similarity check, data enrichment alteration, real time alerting, basket analysis, bubble chart Warehouse validation, single customer view etc. defined by Strategy. This tool is developing high performance integrated data management platform which will seamlessly do Data Integration, Data Profiling, Data Quality, Data Preparation, Dummy Data...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Bcrypt for Windows

    Bcrypt for Windows

    Bcrypt encrypts and decrypts files using the blowfish algorithm

    Bcrypt encrypts and decrypts files using the blowfish algorithm. Encrypted files will be saved with an extension of .bfe. Any files ending in .bfe will be assumed to be encrypted with bcrypt and will attempt to decrypt them. Any other input files will be encrypted. If more than one type of file is given, bcrypt will process all files which are the same as the first filetype given. By default, bcrypt will compress input files before encryption, remove input files after they are processed (assuming they are processed successfully) and overwrite input files with random data to prevent data recovery. ...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 7
    DISTOD

    DISTOD

    Distributed discovery of bidirectional order dependencies

    The DISTOD data profiling algorithm is a distributed algorithm to discover bidirectional order dependencies (in set-based form) from relational data. DISTOD is based on the single-threaded FASTOD-BID algorithm [1], but DISTOD scales elastically to many machines outperforming FASTOD-BID by up to orders of magnitude. Bidirectional order dependencies (bODs) capture order relationships between lists of attributes in a relational table. They can express that, for example, sorting books by...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Smart Algorithm

    Smart Algorithm

    Repository implementing a variety of intelligent algorithms

    Smart-Algorithm is a repository implementing a variety of intelligent / metaheuristic optimization algorithms (e.g. Genetic Algorithm, Ant Colony, Particle Swarm, Immune Algorithm). The implementations are provided in multiple languages (Java, Python, MATLAB). The repository’s aim is to offer reference implementations of “smart” algorithms for tasks like route planning, optimization, or algorithm learning.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    TOTP Database

    TOTP server side algorithm

    calculate TOTP using database stored procedures allowing you to validate a user's entered TOTP with a stored secret. Cooperates with all authorization apps that calculate a TOTP using SHA1 encryption
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cloud-based help desk software with ServoDesk Icon
    Cloud-based help desk software with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • 10
    java-string-similarity

    java-string-similarity

    Implementation of various string similarity and distance algorithms

    Implementation of various string similarity and distance algorithms: Levenshtein, Jaro-winkler, n-Gram, Q-Gram, Jaccard index, Longest Common Subsequence edit distance, cosine similarity. A library implementing different string similarity and distance measures. A dozen of algorithms (including Levenshtein edit distance and sibblings, Jaro-Winkler, Longest Common Subsequence, cosine similarity etc.) are currently implemented. The main characteristics of each implemented algorithm are...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    LoopMatcher

    LoopMatcher

    Find sequence-specific stem-loops in FASTA and GenBank files.

    LoopMatcher is a bioinformatics tool that searches for hairpin structures in cDNA / mRNA sequences (in FASTA, GenBank or Vienna format) with specific consensus sequences in the loop. It uses RNAfold to predict sequence structure and UShuffle to generate random sequences with a defined k nucleotide frequency. Also, sequences in GenBank format can be downloaded directly from NCBI using the NCBI access ID. Requirements JAVA Runtime 8. It's highly recommended to have a multicore processor...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Secure File Vault

    Secure File Vault

    A very secure file vault for private files to avoid hackers

    A File vault to store all of your personal items, this file vault could not be brute forced (impossible because of the hashing algorithms). It uses a combination of veracrypt, winrar, 7zip to encrypt your files to ensure that they are secure and not be seen by someone. Once you start to create the file vault, your password gets hashed a million times (only takes 3 seconds) then base 64 3 times and hashed 1 more time, it uses a combination of SHA256, SHA512 and lot of other secret...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Simple Cipher Algorithm

    Simple Cipher Algorithm

    Java Encryption Utility.

    Very simple to use symmetric Java encryption utility. Please write a review. Email me with any questions or problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Seshat Naming and Balancing Service

    Seshat Naming and Balancing Service

    Extended COS Naming and Balancing Service

    The Seshat Extended Naming and Balancing Service supplies a fully conformant COS Naming Service with extensions allowing you to store any serialized object in the naming tree. The Service also supplies a Balancer for session balancing multiple CORBA servants of the same type in balanced groups. The balanced groups can be bound to the naming tree. If you look up a balanced group you will transparently get a reference to an object in the group. The members of a group can be delivered either...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    COHCAP

    City of Hope CpG Island Analysis Pipeline

    COHCAP (City of Hope CpG Island Analysis Pipeline, pronounced "co-cap") is an algorithm to analyze single-nucleotide resolution methylation data (Illumina 450k methylation array, targeted BS-Seq, etc.). Please note: 1) The SourceForge version of COHCAP is no longer being updated. Please see the GitHub version: https://github.com/cwarden45/COHCAP This was the source repository for the Bioconductor version, with some changes after the decision to only provide the code through...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    karatasi - flip cards on iPhone
    Flip card learning program for iPhone with a spaced learning algorithm. Create your own databases and edit the cards directly on the iPhone. Import Palm databases or csv-formatted files and backup your data with our Java application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    greenDAO

    greenDAO

    Light ORM solution for Android that maps objects to SQLite databases

    Android ORM for your SQLite database. For new apps we recommend ObjectBox, a new object-oriented database that is much faster than SQLite and easier to use. For existing apps based on greenDAO we offer DaoCompat for an easy switch (see also the announcement). greenDAO is an open source Android ORM making development for SQLite databases fun again. It relieves developers from dealing with low-level database requirements while saving development time. SQLite is an awesome embedded relational...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    jsprit

    jsprit

    Open source toolkit for solving rich vehicle routing problems

    jsprit is a java based, open-source toolkit for solving rich Traveling Salesman Problems(TSP) and Vehicle Routing Problems(VRP). It is lightweight, flexible and easy-to-use, and based on a single all-purpose meta-heuristic. Setting up the problem, defining additional constraints, modifying the algorithms and visualizing the discovered solutions is as easy and handy as reading classical VRP instances to benchmark your algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    BitShade

    BitShade

    AES Cipher, Base64 encoder, SHA calculator

    BitShade is a graphic utility to encrypt/decrypt with AES, base64 encode/decode, calculate the SHA checksum. It is cross platform, written in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    FileCrypt

    Android application to do AES-128 bit encryption on all types of files

    This is an android application able to perform AES-128 bit encryption on all types of files. Its tested encryption speed for 1080 HD video on android device is 3.43 MB per second, and decryption speed is 6.25 MB per second for android device with 3 GB RAM and MT6735 Quad-core 1.3 GHz CPU.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    AES Everywhere

    AES Everywhere

    Cross Language AES 256 Encryption Library

    AES Everywhere is Cross Language Encryption Library that provides the ability to encrypt and decrypt data using a single algorithm in different programming languages and on different platforms. This is an implementation of the AES algorithm, specifically CBC mode, with 256-bit key length and PKCS7 padding. It implements OpenSSL-compatible cryptography with randomly generated salt.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    RSA Encryption Tool

    RSA algorithm based encryption tool.

    A simple program written in C# utilizing .NET 4.6 to demonstrate RSA encryption in action. User can select a text file or input any text to encrypt.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 23

    uwindsortablut

    Viking chess (tablut) game with CPU player

    A full implementation of Tablut(aka Viking chess). Supports human vs human and human vs CPU games. Runs as Java Swing application (Java 8 Required). run the game from dist folder with java -jar tablut.jar Implemented By University of Windsor computer science students during Introduction to Artificial Intelligence course taught by Professor Kalyani Selvarajah. Please read the White Paper pdf for full game rules and description of CPU player artificial intelligence. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    TraySafe

    TraySafe

    Elegant and reliable profile data storage

    ...PIN functionality is included in versions 1.1.0 and above. The serious perk of the app is that all the info is saved as encrypted data in the data.tsf file in the program directory. The simple yet effective encryption algorithm has a password hash, salt key and vigenère cipher key that are changed with every update. The only thing you have to do when updating is to delete the .tsf files and re-enter all your info again so that it can be encrypted using the new parameters. Detailed How-To can be found in the project wiki.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    IP-Chat

    IP-Chat

    UDP based desktop chatting app which supports AES-256 bit encryption.

    Simple Encrypted chat application built with Java. It uses AES-256 bit block cipher algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project