Showing 40 open source projects for "caesar-lisflood"

View related business solutions
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    caesar-lisflood

    caesar-lisflood

    CAESAR-Lisflood landscape evolution model

    Caesar Lisflood is a geomorphological / Landscape evolution model that combines the Lisflood-FP 2d hydrodynamic flow model (Bates et al, 2010) with the CAESAR geomorphic model to simulate erosion and deposition in river catchments and reaches over time scales from hours to 1000's of years. These sourceforge pages provide downloads of the .exe and the source code for CAESAR-lisflood and instructions and additional documentation can be found in the Wiki tab. ...
    Leader badge
    Downloads: 46 This Week
    Last Update:
    See Project
  • 2
    Caesar.jl

    Caesar.jl

    Robust robotic localization and mapping

    A multimodal/non-Gaussian robotic toolkit for localization and mapping -- reducing the barrier of entry for sensor/data fusion tasks, including Simultaneous Localization and Mapping (SLAM). Code changes are currently tracked via Github's integrated Milestone/Issues/PR system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    CTFcrackTools

    CTFcrackTools

    China's first CTFTools framework

    ...Use kotlin and java mixed development. This is probably the first tool framework applied to CTF in China. Built-in current mainstream password, includes but is not limited to Virginia password, Caesar password, fence password. Users can write plugs independently, but only support Python to write plugs. The writing method is also extremely simple. (Due to Jython's own reasons, he was temporarily unable to support Python3) When introducing plugs, remember to confirm that the jython file has been loaded. The project has been enhanced. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Compiled Pastoral Edition

    Compiled Pastoral Edition

    The "Compiled Pastoral Edition" of the Holy Bible.

    ...Compiled Pastoral Edition of the Holy Bible. 2024(CCYY). 200 208 220 1 4 5 229 230 071 242 253 268 291 292 306 ~~~IDENTIFIER~~~ DC:IDENTIFIER:URN:CLSID:2A01069A-3C88-1042-60E5-EA4F92E3AE60 SOURCE:compiled-pastoral-edition-of-the-holy-bible HASH(SHA1):360c01347aecafcb1e181185e7cfd297ffe9f10b ~~~COPYRIGHT~~~ THIS PUBLICATION ("Compiled Pastoral Edition") IS PROTECTED BY COPYRIGHT (Copyright © 2024, ALEXANDER CAESAR N. ALMEDA), HOWEVER, RELEASED ON ANY JURISDICTION WORLDWIDE UNDER THE TERMS AND CONDITION ON MATTERS OF PUBLISHED WORKS OF PUBLIC DOMAIN. ~~~PUBLISHER~~~ ALEXANDER CAESAR N. ALMEDA ~~~
    Downloads: 6 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5

    enervige

    A statistical tool to break the Vigenere cipher

    Enervige is a Python-based project for encryption, decryption, and cryptanalysis of text using the Caesar and Vigenère ciphers in French and English. The project includes advanced statistical techniques to break the Vigenère cipher using methods like frequency analysis, mutual index of coincidence (ICM), and Pearson's coefficient of correlation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Ascon

    Ascon

    Command-line Ascon v1.2 Encryption Tool written in Go

    Ascon is a new family of authenticated encryption algorithms, submitted to the CAESAR competition for authenticated ciphers. The Ascon family was designed to be lightweight and easy to implement, even with added countermeasures against side-channel attacks. This project is licensed under the ISC License. Copyright © 2020-2022 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/ascon Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Grain128AEAD

    Grain128AEAD

    A lightweight AEAD stream cipher submitted to the CAESAR competition

    Grain is a stream cipher submitted to eSTREAM in 2004 by Martin Hell, Thomas Johansson and Willi Meier. It has been selected for the final eSTREAM portfolio for Profile 2 by the eSTREAM project. Grain is designed primarily for restricted hardware environments. It accepts an 80-bit key and a 64-bit IV. The specifications do not recommended a maximum length of output per (key, iv) pair. A number of potential weaknesses in the cipher have been identified and corrected in Grain 128a which is now...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    ModelRunner

    ModelRunner

    Lisflood batch processor

    ModelRunner is a simple batch processor to run Lisflood models.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Jack LIRE (Linked Record)

    Jack LIRE (Linked Record)

    Quantum universal object system with referencing and genetics

    Jack LIRE (Linked Record) is a quantum database-backed life-long text record diary with referencing (linking) between records, and a data library for life-long keeping of files such as documents, photographs, music and more. The diary records are fully searchable. Files can be mentioned in diary records to preserve memories, document knowledge and ideas, and more. Massive numbers of diary records and files can be permanently kept. A database located on one computer can be accessed from...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    DECODE CAESAR CIPHER DECRYPT
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    TeaCrypt-lib

    TeaCrypt-lib

    Tiaray's Exposed Architecture library

    Exposed architecture for integrity and confidentiality. Librairie en matière première pour la cybersécurité.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    approach to encryption and decryption involves two strings. The first is an encryption / decryption string which we will allow to be up to 128 lower case alphabetical characters in length. The second string is a line of text from a file that is to be encrypted or decrypted. the basic strategy for encrypting data is based on mapping alphabetical characters to specific values, then doing some simple mathematical operations to create a new value.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    n-chinese-remainders

    n-chinese-remainders

    chinese remainder theorem - progressive solving, n-soln, extras

    ...crAll2@crtwo provides n soln near x for CR using width of soln crchart3 shows sawtooth CR waves and visible soln align1: solves i m2 == j m2 + b -> {i,j,dist} (like PowerMod->i but b is any and gcd(m1,m2) not req.) other funs: Euclidians, showFactors, changeBaseArr, caesar, rsa, inverseMod, IntToModTups (large number math for PC's) crfindnSolnAfterxInEqm (solve saw wave LL,RL,LR,... intersects) congruence, plots, y-shifted triangular wave solve, testing (for historic reasons files are also in https://sourceforge.net/projects/periodictablemm/)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    CaesarIA (openCaesar3)

    CaesarIA (openCaesar3)

    Remake of the classic Caesar III game

    ...Help us set new stage in good old Caesar.
    Downloads: 34 This Week
    Last Update:
    See Project
  • 16

    Caesar Cipher v1

    Encrypt your messages with Caesar Cipher algorithm.

    Encrypt your messages with Caesar Cipher algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    CryptoDoctor

    Easy encryption and decryption of Texts

    CryptoDoctor is a simple but powerful tool to encrypt and decrypt texts. It is currently available in german language. Moved to GitHub.com: http://saladan.github.io/CryptoDoctor
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Cryptography Tools

    Classic & Modern Cryptography tools

    Cryptography Tools is a project to develop demonstration tools on classic (currently Caesar and Playfair) & modern crypto-systems, including private & public key encryptions, digital signatures, cryptographic hashes and authenticated encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Word Cipher - Encryption/Decryption tool

    Word Cipher - Encryption/Decryption tool

    Encryption/Decryption tool for words/hash/digits/encoded text

    Word Cipher - KRIEG Technologies Developed by: Northumber, KRIEG Technologies This application is developed for encode/decode words and translate them into commons encryption languages but also ancient ciphering language.You can encrypt/decrypt words or text or digits into: ----- Text Ciphering ----- Albam Latin (Temurah) Atbash Latin (Temurah) Avgad Latin (Temurah) Caesar Cipher Flipped Text ----- Text Rotation ----- ROT5 (Digits) ROT13 (Text) ROT18 (Text & Digits) ROT47 ----- Text to Number ----- Binary Hexadecimal ----- Text Encoding ----- Base 64 HTML Entities ----- Text Hashing ----- AES MD5 SHA1 (160 bit) SHA256 SHA384 SHA512 Word Cipher is a free-distributed software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Caesar cipher on JS

    Caesar cipher on JavaScript, simple

    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that each ciphertext will differ radically from every other, even on the same message and identical key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Simple Cipher Decoder

    Simple Cipher Decoder

    Decrypts and encrypts substitution, transposition and vigenere ciphers

    ...This is a series of three simple programs that will allow you to easily encrypt and decrypt text using any combination of substitutions, transpositions, vigenere ciphers or caesar shifts. The programs will not completely solve the ciphers for you haowever they will make it very clear to see how to solve them and ensure that there is no need for tedious manual work.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 23

    JCryptor

    JCryptor is an encrypting tool based on the Caesar-cipher.

    JCryptor uses the Caesar-cipher to encrypt keystrokes on-the-fly. It can also be used to decrypt an encrypted text easily. Caesar-cipher is a simple encryption algorithm, developed by Julius Caesar, to encrypt his correspondence with Cicero in the ancient world. Therefore it uses a simple character substitution method to replace a given character by another.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    Caesar Cipher Encrypter-Decrypter

    this program is a Caesar cipher encrypter and decrypter

    This Program is a Caeser Cipher Encrypter and Decrypter If you want to Encrypt a plain text, then press E or If you want to Decrypt a secret text, then press D If you choose to Encrypt, then you have to enter the Shift key Which will the shift each character by that key If you choose to Decrypt, then you can enter the shift key if you know it, or else you can choose to type 'all' which will give you all possible combinations. By: Ravi Sharma (rvisharma)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Ceasar is an open-source multi-frequency tone gereator for UNIX, initially Linux. By default it contains standard DTMF tones together with C5 (bluebox) tones.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB