Search Results for "secure hash algorithm" - Page 7

Showing 182 open source projects for "secure hash algorithm"

View related business solutions
  • Cloud-based help desk software with ServoDesk Icon
    Cloud-based help desk software with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    Rinecrypt uses the Gladman implentation of the AES algorithm Rijndael and a SHA256 hash among other things, to encrypt/decrypt a file with a user supplied passsword.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Secure P2P Instant Messenger running on .NET Framework 2.0. Uses server to store user information (user name, password, email address, friends list, log in state, IP address) in encrypted form. Uses custom designed symmetric encryption algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    EMURA is a suite of Java applications that allows two users to send encrypted messages back and forth - as a chat. The encryption key is secure and generated using the Diffie-Hellman algorithm. Utilizes GNU-CRYPTO libraries
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    JSRSA is a Javascript/PHP implementation of RSA algorithm which help you to simulate SSL-Like secure data transmission over the net as easy as possible !
    Downloads: 0 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 5
    A very powerful and secure encryption supporting multilevel algorithm hierarchy encryption(bit level),supports infinite length keys and equation creation utility(secondary key) for the utmost security.Support for multiple algorithms.All OS support(ja
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Secure downloads by checksum verification using several hash algorithms like md5 or sha1 to verify your downloaded packages using an independet third site.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A framework for easily building applications in C++ utilizing distributed hash tables. Based loosely on the Kademlia algorithm. Will include broadcast and aggregation functionality.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Brute is a brute force hash cracker, it allows the user to specify how many threads he want running simultaneously. It is fast, and modular, all the hash algorithm dependent code lies in a module (a shared library). Modules available: MD5; SHA256; SHA512
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Ermdia is a yet another implementation of Kademlia, which is one of the algorithm of ditributed hash table (DHT), in Erlang. This software is lightweight, fast and easy to understand since an amount of source code is quite small.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 10
    Semeir is a Encryption algorithm, Capable of block encryption. It is written in pure C. It is platform independent, and is promising for Embedded systems. Intended as an alternate, yet secure data encryption cipher.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    The Ultimate Secure Login is a secure login system that prevents unauthorized access to PHP scripts using HMAC algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The MFV (Multiple File Verifier) project has been designed to improve the sfv standard with new hash standards. Instead of the 32 bit CRC (SFV) algorithm,one of the new algoritms such as MD5 SHA-1 SHA-256 SHA-384 and SHA-512 can be used by users' choice
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ECGL-STK is Engineering Computing GNU/Linux sub-project named Secure ToolKit, which provide non-root permission user running system command or script with hash check sum and background monitor.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Convolutional Hashing Algorithm. Provably secure hashing algorithm based on worst case assumptions on cyclic-lattices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Secure Addressbook is based on the JavaScript implementation of Wheeler & Needham's Block TEA (Tiny Encryption Algorithm) by Chris Veness. It allows maintaining secure records even the on shared hosting server, as data en/decrypted at browser only.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    The OSCAR Backup System is a PERL powered graphical frontend for rsync over ssh backups in the Windows environment. The Rsync algorithm and SSH tunnel encryption makes this archival tool extremely secure and efficient.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Flash/PHP adaptation of the XTEA encryption algorithm. Allows encryption/decryption of sensitive data using 128-bit key. May be used for network data (HTTP) or offline for implementations like secure CD-ROM projects.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    PasswordChain is a secure Web-based password database designed to securely encrypt and store passwords. Data is encrypted using the Blowfish algorithm and stored in a MySQL database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Pot of Gold is an open source implementation of Philippe Oechslin's "Faster Cryptanalytic Time-Memory Trade-Off" paper. It performs precomputation on a particular hash algorithm which can be later used to reverse certain hashes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    This is a very powerfull criptography project that basicaly can be used to transmit or store secure data and study some cipher, hash and compression algorithms to understands how it works.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    An encryption and decryption program using the AES (Rijndael) cryptography algorithm and hashing the key with the SHA-1 hash algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Fast 256 bit hash algorithm and simple command line utility. Also does sha-1 and sha-256.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    PHP based Authentication code that makes HTML pages secure by authenticating users agianst a MySQL database. Uses a MD5 algorithm session id to futher secure a session.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    sha is a file hashing utility that uses the NIST's SHA-1, SHA-256, SHA-384, & SHA-512 hash algorithms. It can be used for file integrity checking, remote file comparisons, etc. The portable algorithm implementations can be useful in other projects too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    I needed a library of functions that enabled me to perform hash functions and symmetric cryptography. I chose MD5 initially but eventually chose SHA as the hashing algorithm due to concerns regarding the \'collision resistance\' of MD5 due to weakne
    Downloads: 0 This Week
    Last Update:
    See Project