Search Results for "encryption algorithm java"

Showing 1105 open source projects for "encryption algorithm java"

View related business solutions
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • Build on Google Cloud with $300 in Free Credit Icon
    Build on Google Cloud with $300 in Free Credit

    New to Google Cloud? Get $300 in free credit to explore Compute Engine, BigQuery, Cloud Run, Vertex AI, and 150+ other products.

    Start your next project with $300 in free Google Cloud credit. Spin up VMs, run containers, query exabytes in BigQuery, or build AI apps with Vertex AI and Gemini. Once your credits are used, keep building with 20+ products with free monthly usage, including Compute Engine, Cloud Storage, GKE, and Cloud Run functions. Sign up to start building right away.
    Start Free Trial
  • 1
    AWS Encryption SDK for Java
    ...With the AWS Encryption SDK, you define a master key provider (Java and Python) or a keyring (C, C#/.NET, and JavaScript) that determines which wrapping keys you use to protect your data. Then you encrypt and decrypt your data using straightforward methods provided by the AWS Encryption SDK. The AWS Encryption SDK does the rest. Without the AWS Encryption SDK, you might spend more effort on building an encryption solution than on the core functionality of your application. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Hello Algorithm

    Hello Algorithm

    Animated illustrations, one-click data structure

    Animated illustrations, one-click data structure and algorithm tutorials. This project aims to create an open source, free, novice-friendly introductory tutorial on data structures and algorithms. The whole book uses animated illustrations, the content is clear and easy to understand, and the learning curve is smooth, guiding beginners to explore the knowledge map of data structures and algorithms. The source code can be run with one click, helping readers improve their programming skills...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Java JWT

    Java JWT

    Java implementation of JSON Web Token (JWT)

    A Java implementation of JSON Web Token (JWT) - RFC 7519. This library requires Java 8 or higher. The last version that supported Java 7 was 3.11.0. The library implements JWT Verification and Signing using several algorithms. The Algorithm defines how a token is signed and verified. It can be instantiated with the raw value of the secret in the case of HMAC algorithms, or the key pairs or KeyProvider in the case of RSA and ECDSA algorithms.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 4
    X's Recommendation Algorithm

    X's Recommendation Algorithm

    Source code for the X Recommendation Algorithm

    The Algorithm is Twitter’s open source release of the core ranking system that powers the platform’s home timeline. It provides transparency into how tweets are selected, prioritized, and surfaced to users, reflecting Twitter’s move toward openness in recommendation algorithms. The repository contains the recommendation pipeline, which incorporates signals such as engagement, relevance, and content features, and demonstrates how they combine to form ranked outputs. Written primarily in...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Easily Host LLMs and Web Apps on Cloud Run Icon
    Easily Host LLMs and Web Apps on Cloud Run

    Run everything from popular models with on-demand NVIDIA L4 GPUs to web apps without infrastructure management.

    Run frontend and backend services, batch jobs, host LLMs, and queue processing workloads without the need to manage infrastructure. Cloud Run gives you on-demand GPU access for hosting LLMs and running real-time AI—with 5-second cold starts and automatic scale-to-zero so you only pay for actual usage. New customers get $300 in free credit to start.
    Try Cloud Run Free
  • 5
    aws-encryption-sdk

    aws-encryption-sdk

    AWS Encryption SDK

    ...With the AWS Encryption SDK, you define a master key provider (Java and Python) or a keyring (C, C#/.NET, and JavaScript) that determines which wrapping keys you use to protect your data. Then you encrypt and decrypt your data using straightforward methods provided by the AWS Encryption SDK. The AWS Encryption SDK does the rest. Without the AWS Encryption SDK, you might spend more effort on building an encryption solution than on the core functionality of your application.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    google-java-format

    google-java-format

    Reformats Java source code to comply with Google Java Style

    google-java-format is a program that reformats Java source code to comply with Google Java Style. The formatter can act on whole files, on limited lines, on specific offsets, passing through to standard-out (default) or altered in-place. There is no configurability as to the formatter's algorithm for formatting. This is a deliberate design decision to unify our code formatting on a single format.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    xxHash

    xxHash

    Extremely fast non-cryptographic hash algorithm

    xxHash is an extremely fast non-cryptographic hash algorithm, working at RAM speed limit. It is proposed in four flavors (XXH32, XXH64, XXH3_64bits and XXH3_128bits). The latest variant, XXH3, offers improved performance across the board, especially on small data. It successfully completes the SMHasher test suite which evaluates collision, dispersion and randomness qualities of hash functions. Code is highly portable, and hashes are identical across all platforms (little / big endian)....
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    Amazon DynamoDB Encryption Client Python

    Amazon DynamoDB Encryption Client Python

    Amazon DynamoDB Encryption Client for Python

    The Amazon DynamoDB Encryption Client for Python provides client-side encryption of Amazon DynamoDB items to help you to protect your table data before you send it to DynamoDB. It provides an implementation of the Amazon DynamoDB Encryption Client that is fully compatible with the Amazon DynamoDB Encryption Client for Java. The helper clients provide a familiar interface but the actual item encryption and decryption is handled by a low-level item encryptor. ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 9
    Cryptomator

    Cryptomator

    Multi-platform transparent client-side encryption for your cloud files

    Cryptomator is a free and open source project that offers multi-platform, transparent client side encryption of your files in the cloud. It works with just about any cloud storage service; is totally transparent so you can work with your files how you normally would; and secure with a 256-bit key length AES encryption. It’s also simple and easy to use with no need for different accounts, key management, cloud access grants or cipher configurations.
    Downloads: 47 This Week
    Last Update:
    See Project
  • 99.99% Uptime for MySQL and PostgreSQL on Google Cloud Icon
    99.99% Uptime for MySQL and PostgreSQL on Google Cloud

    Enterprise Plus edition delivers sub-second maintenance downtime and 2x read/write performance. Built for critical apps.

    Cloud SQL Enterprise Plus gives you a 99.99% availability SLA with near-zero downtime maintenance—typically under 10 seconds. Get 2x better read/write performance, intelligent data caching, and 35 days of point-in-time recovery. Supports MySQL, PostgreSQL, and SQL Server with built-in vector search for gen AI apps. New customers get $300 in free credit.
    Try Cloud SQL Free
  • 10
    AlgoSim

    AlgoSim

    AlgoSim : création, analyse et exécution des algorithmes

    AlgoSim un Logiciel de création, analyse, simulation et exécution des algorithmes. Il ne nécessite aucun apprentissage de langage de programmation. Ce logiciel n'utilise pas un éditeur de texte comme les logiciels classiques de programmation. Ce logiciel peut être utilisé par des débutants pour apprendre la programmation et exercer leurs connaissances. Il peut être utilisé par des professionnel pour tester leurs algorithmes, les vérifier et générer des programme présentables (pseudo-code ou...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 11
    shadowsocks-libev

    shadowsocks-libev

    Bug-fix-only libev port of shadowsocks

    Shadowsocks-libev is a lightweight secured SOCKS5 proxy for embedded devices and low-end boxes. Shadowsocks-libev is written in pure C and depends on libev. It's designed to be a lightweight implementation of shadowsocks protocol, in order to keep the resource usage as low as possible. Snap is the recommended way to install the latest binaries. You can build shadowsocks-libev and all its dependencies by script. The latest shadowsocks-libev has provided a redir mode. You can configure your...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 12
    Wesh Network Toolkit

    Wesh Network Toolkit

    Async Mesh Network Protocol for Extreme Communication

    ...Wesh provides a secured, distributed and asynchronous communication protocol, both with or without internet access using IPFS and direct transports such as BLE and proximity drivers. Wesh Protocol provides end-to-end encryption and perfect forward secrecy for all the exchanged messages. Distributed p2p transmissions and hosting over IPFS powered by CRDT algorithm. Efficient end-to-end encryption and perfect forward secrecy to prevent eavesdropping and provide reliable identity access management. Distributed authentication and authorization. Multiple devices per identity. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 13
    Speedcrypt File Encryption

    Speedcrypt File Encryption

    A File Encryptor with many Options and Powerful Algorithms!

    Speedcrypt is a software to encrypt your data that implements some of the most powerful and secure algorithms in the world. It also uses the most sophisticated password derivation techniques, with very robust HASH Functions. Speedcrypt implements libraries such as Bouncy Castle and others among the most used in the world of cryptography! Speedcrypt is a free program for encrypt the files which helps you to manage in a secure way. The files are encrypted using the best and most Secure...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 14

    Java-Enigma

    Enigma Encryption Simulator in Java

    This program is an offline and stand-alone Java application which simulates the Enigma encryption machine that was used during World War II.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 15
    SOFAJRaft

    SOFAJRaft

    A production-grade java implementation of RAFT consensus algorithm

    SOFAJRaft is a production-level, high-performance Java implementation based on the RAFT consistency algorithm that supports MULTI-RAFT-GROUP for high-load, low-latency scenarios. With SOFAJRaft you can focus on your business area. SOFAJRaft handles all RAFT-related technical challenges. SOFAJRaft is very user-friendly, which provides several examples, making it easy to understand and use.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16
    bitcoinj

    bitcoinj

    A library for working with Bitcoin

    ...A wallet class with encryption, fee calculation, multi-signing, deterministic key derivation, pluggable coin selection/coin control, extensions support and event listeners that let you stay up to date with changes in your balance. Experimental full verification mode, which does the same verification work as Bitcoin Core. In this mode, the unspent transaction output set (UTXO set) is calculated.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 17
    react-native-keychain

    react-native-keychain

    Keychain Access for React Native

    Keychain Access for React Native. Both setGenericPassword and setInternetCredentials are limited to strings only, so if you need to store objects etc, please use JSON.stringify/JSON.parse when you store/access it. On API levels that do not support Android keystore, Facebook Conceal is used to en/decrypt stored data. The encrypted data is then stored in SharedPreferences. Since Conceal itself stores its encryption key in SharedPreferences, it follows that if the device is rooted (or if an...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 18
    Algorithm Visualizer

    Algorithm Visualizer

    Interactive Online Platform that Visualizes Algorithms from Code

    Hacker Scripts is a light-hearted collection of small automation and demo scripts that solve amusing everyday tasks or illustrate quick integrations with external services. The repo collects short programs (originally a set of shell and Ruby scripts) and many community contributed ports in other languages to show “how you might automate X” — for example sending a quick SMS, firing off an email, or triggering a coffee maker — with examples and scheduling snippets included. The README explains...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    IK Analysis for Elasticsearch

    IK Analysis for Elasticsearch

    A plugin that integrates Lucene IK analyzer into elasticsearch

    ...In the 2012 version, IK implemented a simple word segmentation ambiguity elimination algorithm, marking the evolution of the IK tokenizer from pure dictionary word segmentation to analog semantic word segmentation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    jasypt-spring-boot

    jasypt-spring-boot

    Jasypt integration for Spring boot

    Jasypt Spring Boot provides Encryption support for property sources in Spring Boot Applications. There are 3 ways to integrate just-spring-boot in your project. And encryptable properties will be enabled across the entire Spring Environment (This means any system property, environment property, command line argument, application.properties, yaml properties, and any other custom property sources can contain encrypted properties) Jasypt uses an StringEncryptor to decrypt properties. For all 3...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Random Cut Forest by AWS

    Random Cut Forest by AWS

    An implementation of the Random Cut Forest data structure

    This repository contains implementations of the Random Cut Forest (RCF) probabilistic data structure. RCFs were originally developed at Amazon to use in a nonparametric anomaly detection algorithm for streaming data. Later new algorithms based on RCFs were developed for density estimation, imputation, and forecasting. The different directories correspond to equivalent implementations in different languages, and bindings to to those base implementations, using language-specific features for...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 22
    Telegram for Android

    Telegram for Android

    Telegram messenger for Android

    Telegram is a wonderful and private messaging app that offers simple, fast, secure and synced messaging for all your devices. It delivers messages faster than any other application; cloud-based so you can access your messages from any device; and very secure, with messages heavily encrypted and could even self-destruct. Telegram is simple and fun to use, with powerful photo and video editing tools as well as an open sticker/GIF platform to let you express yourself fully. It’s also...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 23
    JE is a fast, feature rich and powerful programming editor written in Java. It has all features a modern editor must have, plus some more. JE can also be used as a editor panel in other Java applications or applets. For installation, just install Java, download the je.jar file, and start the program with "java -jar java.jar" on a command line. For more easy use, create a batch file on your system containing something like "javaw -jar java.jar %1" (Windows syntax shown). The editor will...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 24
    Amaze File Manager

    Amaze File Manager

    Material design file manager for Android

    Amaze File Manager is an open source Material Design file manager for Android. It makes Material Design's exceptional features easier than ever to access on your Android device. It comes with an easy-to-use navigation drawer for quick navigation plus plenty of awesome features. It allows you to work on multiple tabs at a time; provides quick access to history, bookmarks or any file; has an inbuilt Database Reader, Zip/Rar Reader, Apk Reader, Text Reader and so much more! Amaze File Manager...
    Downloads: 22 This Week
    Last Update:
    See Project
  • 25
    International Components for Unicode

    International Components for Unicode

    The home of the ICU project source code

    ICU is a mature, widely used set of C/C++ and Java libraries providing Unicode and Globalization support for software applications. ICU is widely portable and gives applications the same results on all platforms and between C/C++ and Java software. ICU is released under a nonrestrictive open-source license that is suitable for use with both commercial software and with other open-source or free software.
    Downloads: 8 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB
Gen AI apps are built with MongoDB Atlas
Atlas offers built-in vector search and global availability across 125+ regions. Start building AI apps faster, all in one place.