Open Source Cryptography Software - Page 37

Cryptography Software

View 5855 business solutions
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 1
    Kypeless

    Kypeless

    Fully decentralised secure p2p communication program

    Kypeless encapsulates strong symmetric and asymmetric cryptography so you can get the benefits of secure communication following some simple steps. Right now, Kypeless is unstable pre-alpha software, published only for testing purposes. Kypeless allows you to exchange instant messages, long not-so-instant messages and files, but a lot more features are planned to be implemented later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    LDAP Mobile Admin is an JavaME application to provides administration to an LDAP Server using the mobile Phone
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    The LTC Encryption program is designed to implement the cryptographic functions contained in the libtomcrypt.a library. It works similar to PGP, but does not use the OpenPGP standards.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Largest Generic Hash and HMAC Program

    57 Hash Functions In One Program, plus each with HMAC or KMAC

    FEHASHMAC is the largest collection of publicly known hash algorithms integrated into a command-line utility. FEHASHMAC contains a set of known test vectors and results for each algorithm such that the correct implementation for each hardware platform and compiler version can directly be verified. Currently 57 hash algorithms like sha1 sha224 sha256 sha384 sha512 and variants, sha3 and shake, all SHA3 finalists and blake3, md2 md4 md5 md6, rmd128 rmd160 rmd256 rmd320, whirl gost lash160 lash256 lash384 lash512 tiger2 and RFC 2104 HMAC and KMAC support are included, plus SHA3 extensions kmac128, kmac256, kmacxof128, kmacxof256 for message.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
    Compliant and Reliable File Transfers Backed by Top Security Certifications

    Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

    Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
    Start Free Trial
  • 5
    LastBit Suite

    LastBit Suite

    A steganographic program to hide files into images

    This is a steganogric program that uses images last bits to hide information ( files ). It can crypt data with a rotation and a xor key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Latin Square Toolbox

    Generates Latin squares and counts their transversals

    The Latin Square Toolbox contains software tools for efficiently generating Latin squares and counting their transversals with various user-configurable options. This open source release aims to help educate folks on Latin squares and their important applications to cryptography. This version contains three tools: 0. Latin Square Generator (LSG) 1. Latin Square Transversal Counter (LSTC) 2. Latin Square Property Checker (LSPC)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    LavaRnd is a random number generator that converts a digitized chaotic source (such as a lens capped web camera) into cryptographically strong random numbers. LavaRnd comes with both an APIs (currently C and Perl) as well as a number of demos.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The Leeter is an easy-to-use and convinient program to easily write hardly understandable text. While this is mainly not the intention of normal chatters it may be a nice joke to try out on friends. Provides 5 different options to scramble up your text.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    LexPortal is a complete new portal for the phpBB (3.0.4 >) community forum. The LexPortal has a special page system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10

    LibPKI

    Easy to use PKI library

    The LibPKI Project is aimed to provide an easy-to-use PKI library for PKI enabled application development. The LibPKI Project enables developers with the possibility to implement complex cryptographic operations with a few simple function calls.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    libgcrypt-py is a Python wrapper around the libgcrypt cryptographic library. It supports functionality/algorithms that are supported by libgcrypt, including Symetric Ciphers (3DES, AES, Twofish, Blowfish), Cryptographic Hashing (MD5, SHA1, RIPE-MD160), P
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Libmkeys is a C++ class library implementing the MIKEY(Multimedia Internet KEYing) protocol as described in RFC 3830.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    LightCrypto is C cryptography library. It contains Big Number Library, basic crypto algorithms (3DES, DSA, RSA, ECDSA, etc), Internet Voting Scheme, and many more. Current librarie's binary is less than 1MB and it can even be smaller by user config.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    LinBankOS is the number one Onlinebanking-Safesystem in the World. With over 500.000 Customers its the biggest "Browsersecurityproject" in the World.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    How to set up a Linux system to use encryption in disk and network accesses. This document describes how you can use the International Kernel Patch and other packages to make harddisk contents and network traffic inaccessible to others by encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    The Linux Transparent Encryption project aims for integrating transparent read/write access to encrypted data into the linux kernel. This enables any application to use encrypted data without modifying the application itself.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Lite Security Module LSM PKCS11

    Lite Security Module: a daemon to handle PKCS11 Secure Boxes

    Lite Security Module: a daemon to handle Secure Boxes (files containing cryptographic keys, X509 certificates and data objects), accessible through a PKCS#11 library, supporting non-certified (lite) Software or Hardware Security Modules (www.clizio.com)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Lizard Cart CMS offers an easy way for people with limited HTML experience to manage the content and products of their websites.It uses PHP/MySql/Java Script comes complete with a WYSIWYG online editor.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    LockPhix provides a solid base to build a full encryption suite. LockPhix consists of three tools: FileVault an en-/decryption tool, ScreenLock a way to lock your PC and PasswordSafe a tool to safely store passwords.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Logical Security is a suite of programs that enhance one's security. Currently, the following functions have been implemented: hashing,encryption,memory dumping,secure file deletion.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    An encryption standard based on the chaotic properties of the logistic map function. With a pseudo-random byte generator, this cipher offers encryption with great statistical improbability.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Blinded digital cash mint, walletware, tools, and open protocols.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Development area for GNU/Linux 2.6.x for the KS8695 ARM SoC. Covers kernel patches, drivers for serial, Ethernet, PCI, GPIO, watchdog subsystems, and drivers for optional PCI based devices such as USB, WiFi, WiMAX, IPSec, SSL, and RSA devices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Designed to use what is known about users via the /etc/passwd file on unix/linux systems to generate a dynamic dictionary or csv file of more accurate guesses as to what their possible password may be, to look for bad password protection practices.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB