Search Results for "encryption algorithm java" - Page 9

Showing 1080 open source projects for "encryption algorithm java"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 1
    Calclipse Attaché

    Calclipse Attaché

    A filing and journaling application

    Attaché is a filing and journaling application written in Java. Attaché provides privacy using password based encryption, and features a flexible search function.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Cracx

    Cracx

    simple and light-weight archive password cracker

    Cracx allows you to crack archive passwords of any encryption using 7-zip, WinRAR or a custom command, via Brute Force or Dictionary attack. Note: You must NOT use this program with files you don't have the rights to extract/open/use them! Currently, the program requires a current version of either 7-zip or WinRAR to be installed, but you can also use it to bruteforce basically anything that is executably via command-line with custom parameters. On an i7 CPU, it runs approximately 30...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 3

    BioPPSy

    A biochemical property prediction system

    Computationally predicts the pharmacokinetic properties of drug candidates using Quantitative Structure Property Relationships (QSPR) modelling. Assembles a set of tools and databases for predicting the physical properties of small molecules. The program models a given property's dependence on a collection of molecular and structural descriptors using a training set of molecules. Neural networks and support vector regression are available, as well as linear models. The models generated by...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    An application that offers comprehensive functionality in the range of digital certificate's management and the possibility of file and directory encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build apps or websites quickly on a fully managed platform Icon
    Build apps or websites quickly on a fully managed platform

    Get two million requests free per month.

    Run frontend and backend services, batch jobs, host LLMs, and queue processing workloads without the need to manage infrastructure.
    Try it for free
  • 5

    Latin Square Toolbox

    Generates Latin squares and counts their transversals

    The Latin Square Toolbox contains software tools for efficiently generating Latin squares and counting their transversals with various user-configurable options. This open source release aims to help educate folks on Latin squares and their important applications to cryptography. This version contains three tools: 0. Latin Square Generator (LSG) 1. Latin Square Transversal Counter (LSTC) 2. Latin Square Property Checker (LSPC)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    SCEO

    Single Cell Event Ordering Algorithm

    This is an implementation of the Single Cell Event Ordering algorithm that was described in J. De Bie et al., "Single cell sequencing reveals the origin and the order of mutation acquisition in T-cell acute lymphoblastic leukaemia". Usage: java -jar SCEO.jar input=input.txt output=output.txt N=n with input = input file containing tab delimited matrix with for each gene a (named) row and for each cell a (named) column with the values 1=event present, 0=event absent, -1=NA output = output...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    WebService::UMLSKS::Similarity::Java

    A measure of semantic relatedness between medical terms using Java

    This is a Java implementation of HSO measure of finding semantic relatedness. The measure is applied to UMLS source vocabularies and is used to find relatedness between medical terms. This implementation uses same algorithm as WebService::UMLSKS::Similarity, a CPAN perl open source package.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Elements of Programming Interviews

    Elements of Programming Interviews

    Method stubs and test cases for Elements of Programming Interviews

    This repository contains method stubs and tests of the problems from Elements Of Programming Interviews by Adnan Aziz, Tsung-Hsien Lee, and Amit Prakash. This book is also available in Python and C++. This repository contains solutions to problems from the book "Elements of Programming Interviews," focusing on interview preparation and algorithm practice.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    crVCL PHP Framework

    crVCL PHP Framework

    Rapid Application Development Framework for PHP

    crVCL PHP Framework is based on PHP 5.4, Javascript 1.4 and CSS 2.1 (or higher). It provide classes and function for develop easy and fast web applications/webpages with graphical components. It give you more comfort in developing web applications with high usability. Rapid Application Development for PHP crVCL is inspired by JEDI VCL and Java Spring If you like the Project, donate it http://goo.gl/PYyiot for more visit the Website or take a look at the readme.txt More Videos...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10

    JILRuntime/JewelScript

    An object-oriented script language to embed in any application

    A general purpose, object-oriented script language that compiles into code for a register based virtual machine. The language is quite similar to object-oriented high-level languages like Java and C#. The library is entirely self-sufficient and ANSI C compliant. It's main purpose is to be embedded in any application to allow automation of that application through scripting. An integrated C++ binding code generator allows you to create bindings for your application's classes in seconds...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    haveged is a daemon that feeds entropy into the linux /dev/random pool using a random number generator based upon the HArdware Volatile Entropy Gathering and Expansion algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    Recursive Directory Removal

    Recursive Directory Removal

    https://github.com/mhisoft/rdpro
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ROXter

    ROXter

    The easiest way to encypt files or text

    This is a ROXster. A program that encrypts files and text with an algorithm based on XOR. You can use it to encrypt your files or text fast and easy. Enjoy!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    file digest

    A command-line utility for calculating and verifying file checksums.

    Digest is a command-line utility which can be used to calculate and verify checksums of any files, similar to md5sum or RHash, but using modern hash algorithms. Supported algorithms: BLAKE, BLAKE2, Grøstl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, Skein, SM3, Streebog, Whirlpool. Usage: digest [-c] <algorithm> <filename(s)> For example, if you want to calculate the checksums using skein512/256 algorithm, use this command: digest skein512/256 * > checksums.skein To verify...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Genetic Oversampling Weka Plugin

    Genetic Oversampling Weka Plugin

    A Weka Plugin that uses a Genetic Algorithm for Data Oversampling

    Weka genetic algorithm filter plugin to generate synthetic instances. This Weka Plugin implementation uses a Genetic Algorithm to create new synthetic instances to solve the imbalanced dataset problem. See my master thesis available for download, for further details.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    OWL Machine Learning

    Machine learning algorithm using OWL

    Feature construction and selection are two key factors in the field of Machine Learning (ML). Usually, these are very time-consuming and complex tasks because the features have to be manually crafted. The features are aggregated, combined or split to create features from raw data. This project makes use of ontologies to automatically generate features for the ML algorithms. The features are generated by combining the concepts and relationships that are already in the knowledge base,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    EntOpt Layout

    EntOpt Layout

    Relative entropy optimization network layout plugin

    The goal of this project is to implement a graph layout / network visualization algorithm as a Java plugin for Cytoscape (http://cytoscape.org/), using a recently published relative entropy optimization based method, called Unified Data Representation (Kovács IA et al. Sci Rep. 2015). If you are using the plugin, please cite: Ágg B, Császár A, Szalay-Bekő M, Veres DV, Mizsei R, Ferdinandy P, Csermely P and Kovács IA (2019) The EntOptLayout Cytoscape plug-in for the efficient visualization...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A spring-based 3D graph layout tool written in Java. Rendering is performed in OpenGL via the JOGL library.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    MStorage

    MStorage

    MStorage - storage for notes.

    ... - carousel navigation in picture view window - AES 128-bit encryption for files - filter for files in tree - check for update file in local drive - auto and manual checking a new version of app - view file in OS file explorer - fixed bug with default OS Encoding FULL DOCUMENTATION https://sourceforge.net/p/mstorage/wiki/Home/ Tested on Win7x64, Win10x32, Ubuntu 16.04x32.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    JView is a command line client for MyWebProject SOAP Web Service. Usage: param 1: endpoint, param 2: remote folder, param 3: algorithm, param 4: modeParam, param 5: userName, param 6: password, param 7: outputFile Example: java -jar JView2.jar http://davidesestili.ddns.net:8080/MyWebProjectLogin/services/GenerateAndDownloadHashWSLogin /home/dsestili82/ SHA-512 no-subfolders davide davide /home/davide/Scaricati/mozilla.sha512 (Currently unavailable) Source code available on https...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Algorithm Database

    Efficient Algorithms implemented in Java

    The Aim of this project is to provide a collection of reusable Algorithms which can be used effectively in different scenarios. Algorithm implementations are in Java. Objective here is to implement algorithms which should be more efficient than the JDK implementation and also to create a platform for the researchers who works on Data Mining, Encryption algorithms, ect.. to collaborate and contribute to this project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Advanced Onion Router
    Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and...
    Leader badge
    Downloads: 175 This Week
    Last Update:
    See Project
  • 23
    jalicanto

    jalicanto

    Traveling Salesman Problem "window time based" aproximate solver

    Time based Traveling salesman problem solver. Using iterated local search algorithm, implements xkick perturbation Programmed in Java. A class to use the TSP Suite(Thomas Weise, Raymond Chiong, J ¨org L¨assig, Ke Tang, Shigeyoshi Tsutsui, Wenxiang Chen, Zbigniew Michalewicz, Xin Yao, Benchmarking Optimization Algorithms: An Open Source Framework for the Traveling Salesman Problem. 2014.),is implemented.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    DES-Rotem

    DES-Rotem

    DES attempt to crack code with 3 rounds

    This Java project is an attempt to crack the key in a DES encryption algorithm. The plaintext and the cyphertext are known. The purpose is to crack the 64-bit key with 3 rounds instead of 16. This project checks all 2^64 possible keys. Therefore, it takes a long time to find the correct key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Ransomware Recovery Tool

    Why pay Ransom when you have Ransomware Recovery Tool for decryption

    ... by encrypting lots of valuable data. But with this, Ransomware Recovery tool, now you can recover files infected by Ransomware and other viruses. This recovery tool is one of the best solution to recover & restore corrupt, damaged and inaccessible data with great efficiency. Ransomware Recovery Tool can recover deleted & corrupted files, images, videos, data in original state. With high end algorithm and two recovery modes, it recover maximum possible data from you corrupted FAT & NTFS drives
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.