Showing 38 open source projects for "caesar-lisflood"

View related business solutions
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
  • Nectar: Employee Recognition Software to Build Great Culture Icon
    Nectar: Employee Recognition Software to Build Great Culture

    Nectar is an employee recognition software built for the modern workforce.

    Our 360 recognition & rewards platform enables everyone (peer to peer & manager to employees alike) to send meaningful recognition rooted in core values. Nectar has the most extensive rewards catalog so users can choose from company branded swag, Amazon products, gift cards or custom reward types. Integrate with your other tools like Slack and Teams to make sending recognition easy. We support top organizations like MLB, SHRM, Redfin, Heineken and more.
  • 1
    caesar-lisflood

    caesar-lisflood

    CAESAR-Lisflood landscape evolution model

    Caesar Lisflood is a geomorphological / Landscape evolution model that combines the Lisflood-FP 2d hydrodynamic flow model (Bates et al, 2010) with the CAESAR geomorphic model to simulate erosion and deposition in river catchments and reaches over time scales from hours to 1000's of years. These sourceforge pages provide downloads of the .exe and the source code for CAESAR-lisflood and instructions and additional documentation can be found in the Wiki tab. These include a full description...
    Leader badge
    Downloads: 15 This Week
    Last Update:
    See Project
  • 2
    Caesar.jl

    Caesar.jl

    Robust robotic localization and mapping

    A multimodal/non-Gaussian robotic toolkit for localization and mapping -- reducing the barrier of entry for sensor/data fusion tasks, including Simultaneous Localization and Mapping (SLAM). Code changes are currently tracked via Github's integrated Milestone/Issues/PR system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    CTFcrackTools

    CTFcrackTools

    China's first CTFTools framework

    The first CTF tool framework in China. China's first CTFTools framework designed to help CTFer quickly overcome the CTF problem. Use kotlin and java mixed development. This is probably the first tool framework applied to CTF in China. Built-in current mainstream password, includes but is not limited to Virginia password, Caesar password, fence password. Users can write plugs independently, but only support Python to write plugs. The writing method is also extremely simple. (Due to Jython's own...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Compiled Pastoral Edition

    Compiled Pastoral Edition

    The "Compiled Pastoral Edition" of the Holy Bible

    ...):360c01347aecafcb1e181185e7cfd297ffe9f10b ~~~COPYRIGHT~~~ THIS PUBLICATION ("Compiled Pastoral Edition") IS PROTECTED BY COPYRIGHT (Copyright © 2024, ALEXANDER CAESAR N. ALMEDA), HOWEVER, RELEASED ON ANY JURISDICTION WORLDWIDE UNDER THE TERMS AND CONDITION ON MATTERS OF PUBLISHED WORKS OF PUBLIC DOMAIN. ~~~PUBLISHER~~~ ALEXANDER CAESAR N. ALMEDA ~~~
    Downloads: 0 This Week
    Last Update:
    See Project
  • Create and run cloud-based virtual machines. Icon
    Create and run cloud-based virtual machines.

    Secure and customizable compute service that lets you create and run virtual machines on Google’s infrastructure.

    Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
  • 5
    Ascon

    Ascon

    Command-line Ascon v1.2 Encryption Tool written in Go

    Ascon is a new family of authenticated encryption algorithms, submitted to the CAESAR competition for authenticated ciphers. The Ascon family was designed to be lightweight and easy to implement, even with added countermeasures against side-channel attacks. This project is licensed under the ISC License. Copyright © 2020-2022 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/ascon Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Grain128AEAD

    Grain128AEAD

    A lightweight AEAD stream cipher submitted to the CAESAR competition

    Grain is a stream cipher submitted to eSTREAM in 2004 by Martin Hell, Thomas Johansson and Willi Meier. It has been selected for the final eSTREAM portfolio for Profile 2 by the eSTREAM project. Grain is designed primarily for restricted hardware environments. It accepts an 80-bit key and a 64-bit IV. The specifications do not recommended a maximum length of output per (key, iv) pair. A number of potential weaknesses in the cipher have been identified and corrected in Grain 128a which is now...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    ModelRunner

    ModelRunner

    Lisflood batch processor

    ModelRunner is a simple batch processor to run Lisflood models.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Jack LIRE (Linked Record)

    Jack LIRE (Linked Record)

    Quantum universal object system with referencing and genetics

    Jack LIRE (Linked Record) is a quantum database-backed life-long text record diary with referencing (linking) between records, and a data library for life-long keeping of files such as documents, photographs, music and more. The diary records are fully searchable. Files can be mentioned in diary records to preserve memories, document knowledge and ideas, and more. Massive numbers of diary records and files can be permanently kept. A database located on one computer can be accessed from...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Find out just how much your login box can do for your customer | Auth0 Icon
    Find out just how much your login box can do for your customer | Auth0

    With over 53 social login options, you can fast-track the signup and login experience for users.

    From improving customer experience through seamless sign-on to making MFA as easy as a click of a button – your login box must find the right balance between user convenience, privacy and security.
  • 10
    TeaCrypt-lib

    TeaCrypt-lib

    Tiaray's Exposed Architecture library

    Exposed architecture for integrity and confidentiality. Librairie en matière première pour la cybersécurité.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    DECODE CAESAR CIPHER DECRYPT
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    approach to encryption and decryption involves two strings. The first is an encryption / decryption string which we will allow to be up to 128 lower case alphabetical characters in length. The second string is a line of text from a file that is to be encrypted or decrypted. the basic strategy for encrypting data is based on mapping alphabetical characters to specific values, then doing some simple mathematical operations to create a new value.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    n-chinese-remainders

    n-chinese-remainders

    chinese remainder theorem - progressive solving, n-soln, extras

    ... shows sawtooth CR waves and visible soln align1: solves i m2 == j m2 + b -> {i,j,dist} (like PowerMod->i but b is any and gcd(m1,m2) not req.) other funs: Euclidians, showFactors, changeBaseArr, caesar, rsa, inverseMod, IntToModTups (large number math for PC's) crfindnSolnAfterxInEqm (solve saw wave LL,RL,LR,... intersects) congruence, plots, y-shifted triangular wave solve, testing (for historic reasons files are also in https://sourceforge.net/projects/periodictablemm/)
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    CaesarIA (openCaesar3)

    CaesarIA (openCaesar3)

    Remake of the classic Caesar III game

    CaesarIA is an open source remake of Caesar III game released by Impressions Games in 1998, it aims to expand the possibilities of the classical city-building simulators and to add new features showing the city life. Now the game work with Windows, Linux, Mac, Haiku and Android. The original Caesar3 game is needed to play openCaesar3. We start crowdfunding campaign for renew graphic set at www.igg.me/at/caesaria-game. Help us set new stage in good old Caesar.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 15

    Caesar Cipher v1

    Encrypt your messages with Caesar Cipher algorithm.

    Encrypt your messages with Caesar Cipher algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    CryptoDoctor

    Easy encryption and decryption of Texts

    CryptoDoctor is a simple but powerful tool to encrypt and decrypt texts. It is currently available in german language. Moved to GitHub.com: http://saladan.github.io/CryptoDoctor
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Cryptography Tools

    Classic & Modern Cryptography tools

    Cryptography Tools is a project to develop demonstration tools on classic (currently Caesar and Playfair) & modern crypto-systems, including private & public key encryptions, digital signatures, cryptographic hashes and authenticated encryption.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    Word Cipher - Encryption/Decryption tool

    Word Cipher - Encryption/Decryption tool

    Encryption/Decryption tool for words/hash/digits/encoded text

    Word Cipher - KRIEG Technologies Developed by: Northumber, KRIEG Technologies This application is developed for encode/decode words and translate them into commons encryption languages but also ancient ciphering language.You can encrypt/decrypt words or text or digits into: ----- Text Ciphering ----- Albam Latin (Temurah) Atbash Latin (Temurah) Avgad Latin (Temurah) Caesar Cipher Flipped Text ----- Text Rotation ----- ROT5 (Digits) ROT13 (Text) ROT18 (Text & Digits) ROT47...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Caesar cipher on JS

    Caesar cipher on JavaScript, simple

    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that each...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Simple Cipher Decoder

    Simple Cipher Decoder

    Decrypts and encrypts substitution, transposition and vigenere ciphers

    ... appreciate it. This is a series of three simple programs that will allow you to easily encrypt and decrypt text using any combination of substitutions, transpositions, vigenere ciphers or caesar shifts. The programs will not completely solve the ciphers for you haowever they will make it very clear to see how to solve them and ensure that there is no need for tedious manual work.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Caesar Cipher Encrypter-Decrypter

    this program is a Caesar cipher encrypter and decrypter

    This Program is a Caeser Cipher Encrypter and Decrypter If you want to Encrypt a plain text, then press E or If you want to Decrypt a secret text, then press D If you choose to Encrypt, then you have to enter the Shift key Which will the shift each character by that key If you choose to Decrypt, then you can enter the shift key if you know it, or else you can choose to type 'all' which will give you all possible combinations. By: Ravi Sharma (rvisharma)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    JCryptor

    JCryptor is an encrypting tool based on the Caesar-cipher.

    JCryptor uses the Caesar-cipher to encrypt keystrokes on-the-fly. It can also be used to decrypt an encrypted text easily. Caesar-cipher is a simple encryption algorithm, developed by Julius Caesar, to encrypt his correspondence with Cicero in the ancient world. Therefore it uses a simple character substitution method to replace a given character by another. A keyshift of thirteen is called ROT13. ROT13 can be decrypted by encrypting it again with ROT13. Even today this simple method is used...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Ceasar is an open-source multi-frequency tone gereator for UNIX, initially Linux. By default it contains standard DTMF tones together with C5 (bluebox) tones.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    CaesarCipher is a simple tool which helps you de/encrypt texts with the caesar cipher. This tool should not be used to encrypt sensitive data like passwords or personal information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next