Search Results for "encryption algorithm java" - Page 18

485 programs for "encryption algorithm java" with 1 filter applied:

  • Turn Your Content into Interactive Magic - For Free Icon
    Turn Your Content into Interactive Magic - For Free

    From Canva to Slides, Desmos to YouTube, Lumio works with the tech tools you are already using.

    Transform anything you share into an engaging digital experience - for free. Instantly convert your PDFs, slides, and files into dynamic, interactive sessions with built-in collaboration tools, activities, and real-time assessment. From teaching to training to team building, make every presentation unforgettable. Used by millions for education, business, and professional development.
    Start Free Forever
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 1
    ObscureEncrypt is a high level security encrypter. It encrypts at three levels, 448 bit Blowfish encryption, Obscurity, high level encryption. Making it almost impossible to decrypt
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    The Tiny Encryption Algorithm (TEA) was developed by David Wheeler and Roger Needham at the Computer Laboratory of Cambridge University. The variant used was developed by David Wagner. TEACrypt 80x86 is the porting of this algorithm to the 80x86 platform
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    A Compression Utility - based on own bit algorithm
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    The goal of this project is to create a new peer-to-peer system that is capable of supporting instant messaging, encryption, and secure sharing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    sha is a file hashing utility that uses the NIST's SHA-1, SHA-256, SHA-384, & SHA-512 hash algorithms. It can be used for file integrity checking, remote file comparisons, etc. The portable algorithm implementations can be useful in other projects too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    jui is a tool for creating Java GUI layout components. It has a powerful but simple layout algorithm and support for the Swing look and feel guidelines.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A mobile agent framework. Instead of relying on protocols across the wire, send an agent to the server to execute. An example is encryption: send an agent to retrieve data, but let it do the encryption. Client side encryption on the server!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Java class file encryption. Class Encrypt is a program that can encrypt a developer's class files and package them into an executable jar file for deployment. The program uses modules for implementing different encryptions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    The Athlete is a virtual robot living in the ODE (Open Dynamics Engine)world. An evolution algorithm is implemented based on the DR-EA-M to optimize its performances. This involves a Genetic algorithm, network of neurons and morphology. All is in java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Sales CRM and Pipeline Management Software | Pipedrive Icon
    Sales CRM and Pipeline Management Software | Pipedrive

    The easy and effective CRM for closing deals

    Pipedrive’s simple interface empowers salespeople to streamline workflows and unite sales tasks in one workspace. Unlock instant sales insights with Pipedrive’s visual sales pipeline and fine-tune your strategy with robust reporting features and a personalized AI Sales Assistant.
    Try it for free
  • 10
    A fast, simple method of establishing musical genre of arbitrary compressed audio files calculated by comparisons with training sets. Program currently consists of a java console program. GUI front end, algorithm upgrades to come.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    I needed a library of functions that enabled me to perform hash functions and symmetric cryptography. I chose MD5 initially but eventually chose SHA as the hashing algorithm due to concerns regarding the \'collision resistance\' of MD5 due to weakne
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A similar to Tripwire, file system integrity checking tool but develop in java and cross platform. This tools checking and source control using check sum algorithm like MD5, SHA and CRC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    a java chat system, that encrypts all transfered data to protect the users privacy. Encryption will be done by rsa, blowfish, 3ds or an easy 'exclusive or' encryption. the client will hava a complete gui, the server in addition a console frontend.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A small chat Program written in Java, which allows you to speak "privately" to other users. It shall get an encryption and a compression. I plan to integrate a dcc-like file-transfer
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A java implementation of the board game SUSAN(tm), invented by Stephen Linhart in 1991. Network features. Computer algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    'Einsatz' is a free Java based application to plan medical services. Using the 'Maurer Algorithm' it calculates the staff and equipment you need for services like sporting events or concerts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    <b>SicHer</b> is an encryption client that will allow secure chat across the internet using AES and a Diffe-Hellman key exchange.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    This project comprises a collection of libraries and applications for the field of program analysis. The starting point is a type analysis for Java programs using Agesen's Cartesian Product Algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    MAGMA: Multiobjective Analyzer for Genetic Marker Acquisition A genetic algorithm for generating SNP tiling paths from a large SNP database based on the competing objectives of cost (number of SNPs) and coverage (haplotype blocks): Hubley R., Zitzler
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    This is a non-causal non-linear encryption system that cannot be cracked by the von-neuman architectures available today
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A Java library for validation of credit cards. Implements the Luhn Algorithm to ensure the card number is well formed, checks card type prefix's and length. The rules are stored in a text file allowing new cards to be added without changing the source
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    OpenLabel is a label placement tool and decluttering algorithm for OpenMap. Labels are placed in full conformance with applicable cartographic specifications and conventions - without overlap or ambiguity.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 23
    Jayenne is a modular, secure, scalable, easy to use and lightweight webserver wirtten in java, that supports encryption (SSL) and scripting languages like Perl.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    SysK allows to crypt text by using system informations calculate the algorithm. For each user,the crypt algo will be different. It's written in C language for Linux x86. The objective is to allows it to crypt streams, binaries and more.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    A cross platform implementation of ECDSA (elliptic curve digital signature algorithm) interface to the aSuretee Token.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.