Showing 34 open source projects for "random hash"

View related business solutions
  • Simplify Purchasing For Your Business Icon
    Simplify Purchasing For Your Business

    Manage what you buy and how you buy it with Order.co, so you have control over your time and money spent.

    Simplify every aspect of buying for your business in Order.co. From sourcing products to scaling purchasing across locations to automating your AP and approvals workstreams, Order.co is the platform of choice for growing businesses.
  • Omnichannel contact center platform for enterprises. Icon
    Omnichannel contact center platform for enterprises.

    For Call centers or BPOs with a very high volume of calls

    Deliver a personalized customer experience with every interaction, across every channel, with uContact, net2phone’s cloud contact center solution.
  • 1
    Optimus id transformation

    Optimus id transformation

    Id obfuscation based on Knuth's multiplicative hashing method for PHP

    With this library, you can transform your internal IDs to obfuscated integers based on Knuth's integer hash. It is similar to Hashids but will generate integers instead of random strings. It is also super fast. If you will be running your code on a 32-bit system or will be working with large prime numbers it is suggested that you install the GMP extension.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    jDiskMark

    jDiskMark

    Java Disk Benchmark Utility

    ...://sourceforge.net/projects/jdiskmark/files/jDiskMark-0.5.1.msi/download Verify your download with SHA-256 Hash: D8EE4181D42B0CEF4806BF903EE9EF44722DB54C6C7F9EEBAC8BE119BB7AF753 Instructions to verify file SHA-256 signature: https://sourceforge.net/p/jdiskmark/wiki/%20Verifying%20SHA-256%20Hash%20on%20Windows%20with%20PowerShell/ ZIP releases: * v0.5-v0.5.1 requires Java 21 * v0.1-v0.4 requires Java 8 NOTE: run as administrator or w sudo to automatically drop disk cache
    Downloads: 23 This Week
    Last Update:
    See Project
  • 3
    Speedcrypt File Encryption

    Speedcrypt File Encryption

    A File Encryptor with many Options and Powerful Algorithms!

    Speedcrypt is a software to encrypt your data that implements some of the most powerful and secure algorithms in the world. It also uses the most sophisticated password derivation techniques, with very robust HASH Functions. Speedcrypt implements libraries such as Bouncy Castle and others among the most used in the world of cryptography! Speedcrypt is a free program for encrypt the files which helps you to manage in a secure way. The files are encrypted using the best and most Secure...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    Password Keeper + Generator

    Password Keeper + Generator

    Free portable cross-platform graphical multi-user password manager

    Free portable cross-platform multi-user password manager, 100%-pure Java. DB for each pkg-user is encrypted and protected by pkg-user hash. In addition - passwords in DB are stored in encrypted form. In result - stored passwords are double encrypted ! Passwords of pkg-users are not stored in program - stored and compared only hashes. Support md2, md5, sha1, sha256, sha384 and sha512 hash. Support export DB to CSV, HTML, XLS or XML and import from CSV, XLS or XML. Simple and intuitive GUI...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Manage Properties Better For Free Icon
    Manage Properties Better For Free

    For small to mid-sized landlords and property managers

    Innago is a free and easy-to-use property management solution. Whether you have 1 unit or 1000, student housing, or commercial properties, Innago is built for you. Our software is designed to save you time and money, so you can spend more time doing the things that matter most.
  • 5
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    Naeon is a secure cloud storage solution that uses unbreakable military-grade encryption and zero-knowledge privacy to protect confidential data in an untrusted environment. The data are encrypted using the AES 256-bit encryption algorithm with a randomly generated 128-character passphrase. Then, it is split into small pieces called chunks, which are obfuscated by adding random data to each chunk to make them unreadable and indecipherable to unauthorized individuals or processes...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6

    Schizoware

    Bulk image name and hash randomizer

    ... filename) and rehashing all files located in limitless folder choices. It can also do all of it automated on a timed interval between 1 and ~35000 something minutes. It's mostly been tested with .jpg, .png and .gif files which all seem to work flawlessly. It's absolutely not intended to be run on random folders filled with non-images, because I don't know how randomizing things will impact those files. yet. The program saves all setting choices e.g. folders and random filename type.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Namecoin

    Namecoin

    Distributed Naming System

    ... => document_infos (name, hash, owner, etc) Main features: * Distributed/decentralized: each user has its own copy of the full database. * Secure: security (with public/private keys) is deeply integrated in the software to allow only the owner of a name to modify it in the distributed database. * Pseudonymous: all transfers of data are public and linked to random generated addresses. * Open: anybody can use namecoin to register a name or to create its own namespace.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Cryptography Playground

    The best cryptography playground available

    The best cryptography playground available Demo @ https://8gwifi.org How to Install wget https://downloads.sourceforge.net/project/cryptography-playgroud/crypto-installer.tar tar xvf crypto-installer.tar;cd crypto-installer ./bootstart.sh Browse http://localhost:8080
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    PrydeWorX Library

    The PrydeWorX C++ Library of workers, tools and utilities.

    The PrydeWorX Library project has been moved to: https://pwxlib.prydeworx.com The page here is kept as historical reference. The information is outdated, and won't get updated any more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Powering the next decade of business messaging | Twilio MessagingX Icon
    Powering the next decade of business messaging | Twilio MessagingX

    For organizations interested programmable APIs built on a scalable business messaging platform

    Build unique experiences across SMS, MMS, Facebook Messenger, and WhatsApp – with our unified messaging APIs.
  • 10
    Alien Cipher

    Alien Cipher

    A bespoke symmetric cipher.

    Released under 'Creative Commons v3' license Alien Cipher is an endevour to build my own symmetric cipher. The primary aim is to simply learn the fundementals and finer details of cryptography in general and build working examples of my ideas in code. The code is shared here for prosterity (future folk) in the guise that it may help others also on the path to cryptography. This code demo uses a 512bit rolling hash table (8x8bytes) at its heart to mix together pre-defined parameters...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    v1pad

    One-time-pad encryption using a virtual pad

    v1pad is a command-line tool that encrypts and decrypts files using one-time-pad encryption. v1pad uses a virtual pad, meaning that the one-time pad is generated dynamically based on user input instead of being stored in a file. The name v1pad is an abbreviation for Virtual One-Time Pad.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    Cube26

    General Purpose A-Z Stream Cipher (C++ implementation)

    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Cube256

    General Purpose Stream Cipher and Crypto System

    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    mg4j-buffer-hash

    Minimal Perfect Hashes using Buffers rather than arrays

    This package implements Minimal Perfect Hashes using Buffers rather than java arrays. It therefore allows the data to be backed by MemCache, Random Access Files, and data stores other than in-memory arrays. It is an adaptation of Minimal Perfect Hashes in version 2.0.1 of MG4J (Managing Gigabytes for Java), a free full-text search engine for large document collections written in Java. MG4J is free software distributed under the GNU Lesser General Public License.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    C++ generic open address hash map

    C++ generic open address hash map

    Simple oaht template class

    The advantage of this project is that you can use this hash map by including only 2 files to your project. (or 1 if you want by cut/paste pool.hpp content directly in hashmap.hpp if you want). It is template and doesn't require that your contained types are PODs, it doesn't require to set delete_key and empty_key. Unlike google densemap. It is mostly "C++ unordered_map" standard conformant and if you download it, you'll find a visual studio project, or a CMakeLists.txt that integrates...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16

    SALMON cipher

    Cryptographic PRNG

    Cryptographically-secure Random Number Generator.It is seeded with a 480-bit key and a 480-bit nonce. The target technology is a stream cipher. Each call to ::Invoke() returns a 32bit word. ( insert notes here about SALMON's operating speed ) SALMON uses a block cipher called SERPENT at the very end portion of its output. SERPENT was a finalist from the NIST selection tournaments. There is also mild use of a portion of Salsa20/12 called a "quarter round function...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    jPass - Cross-Platform Password Manager

    jPass - Cross-Platform Password Manager

    Compiled into a single .jar file. Tiny Password Manager. Portable

    I did not see a pre-built version of this software on the original developers Github project (https://github.com/gaborbata/jpass), so I am taking it upon myself to compile the releases as they come, so that others don't have to. --Description-- JPass is a simple, small, portable password manager application with strong encryption. It allows you to store user names, passwords, URLs and generic notes in an encrypted file protected by one master password. I will not add the source...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Gryptonite (formerly GPassword Manager)

    Gryptonite (formerly GPassword Manager)

    Simple but Powerful, Cross-Platform Password Management Utility

    A simple but powerful cross-platform utility for managing and accessing your most secret data. It stores passwords and whole files, so it can literally store any information you want to keep secret. Access your most-used passwords/URLs right out of a desktop tray icon. For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. Although...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    High Quality Random

    very high quality pseudo random number generation

    A very high quality random number source with unlimited entropy. That is, no limit on the key size used to generate unique sequences of numbers. The method is based on using several instances of random number generators, with several algorithms to have an extensible pool of state or entropy. The longer the key used, the more generators are instantiated. In addition is uses the random number sequence to create a variable size text hash. Unlike most text hashcodes this has no limits...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Gryptonite

    Gryptonite

    Cross-platform encrypted password and file database

    A user-friendly, cross-platform utility for managing and accessing your most secret data. It stores passwords and whole files, so it can literally store any information you want to keep secret. Access your most-used passwords/URLs right out of a desktop tray icon. For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. It's not just...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    SimpleKey

    SimpleKey

    Generates keys up to 500 characters and hashes.

    Ever wanted a random key generator? With SimpleKey, you can generate random keys up to 500 characters in length and save them to text files. These keys can be all numerical, alphanumeric, all alphabetical or the previous three plus special characters. You may use your generated key for whatever purpose. SimpleKey also includes a hash table with which to hash strings and files alike. Hash algorithms include: MD4/5, Sha, Skein, Keccak, Grostl, JH, and Blake.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Eristic Cryptographic Toolkit

    Eristic Cryptographic Toolkit

    Open source P-RNG based cryptography.

    The Eristic Cryptographic Toolkit based on the CRC (Chaotic Random Core). Version 4 is under development and includes: general purpose P-RNG, hash function, cipher, shuffle cipher, with key exchange and authentication on the way. Still in a very Alpha state at the moment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Immutable Collections for Java

    Immutable/Persistent Collections Library

    Library providing immutable/persistent collection classes for Java. While collections are immutable they provide methods for adding and removing values by creating new modified copies of themselves. Each copy shares as much as possible of its structure with other copies to minimize memory consumption. The library includes a singly linked (cons/cddr style) list/stack, an integer trie based indexed list, a 2-3 tree based random access indexed list, a 2-3 tree based map, a hash trie based map...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    elise-ebay

    elise-ebay

    Simulate ebay ecosystem - N clients bid on M items

    Simulate N clients bidding on M items in an 'ebay' style market. Bid values are current highest bid + random value, N(0,1). Goal - maximize throughput (bids/sec) for max number of clients and items to bid on Clients run in separate threads and bid 1k times on each item in the system. User code is 100% thread safe, using 'no lock' & CAS style operations where appropriate. Classes use concurrent hash map, CAS counters, & Container<Bid>. Relative performance was determined...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next