Open Source Cryptography Software - Page 64

  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    distDES is a Java RMI-based application which manages load balancing on heterogeneous clusters. Development will extend the theoretical initial implementation to include clustered Rainbow Table generation and encryption algorithm collision detection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    dkbf is a distributed, keyboard, brute-force program for Linux clusters that attacks Windows NT Lanman and NT hashes using the Message Passing Interface (MPI).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    DrSign, MD5 Ve SHA1 Algoritmaları Gibi Basit Bir Bilgi Özeti Algoritmasıdır. Test Amaçlı Tasarlanmıştır Ve Alpha Seviyesindedir...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    1) support 5 cipher suites : TLS_RSA_WITH_AES_256_CBC_SHA256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 5
    This software shall enable users to send / receive denyable messages: Nobody can prove a message is from / for a specific user. Messages can be made private (by using password) or are public. All messages have an expiration time/date / event
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A library for reading and removing DRM schemes from eBooks. The one and only purpose of said library is providing the ability to access the content of legally obtained eBook under conditions of DRM management server failure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    eCrypt is a powerful text encryption tool that can encrypt and decrypt text using Base64 and Rot13 Encoding. eCrypt can also generate MD5 Hashes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    eMark

    eMark

    Free and open-source PDF signing and verification application.

    eMark is a free and open-source PDF signing and verification application – a powerful Adobe Reader alternative that enables you to securely sign, verify, timestamp, and protect PDF documents using: 🔑 USB tokens and HSM (PKCS#11) 📜 PKCS#12/PFX certificates 💻 Windows certificate store Works seamlessly on Windows, Linux, and macOS with an Adobe Reader-like interface featuring professional signature verification capabilities. Built for individuals, enterprises, and government organizations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    1. project name eXPimenttk (e-SecureOffice) 2.Language Java (req. - at least j2re) 3.target platform - Cross-platform software 4.problem we want to sole- Encryption, Decryption software, File eraser, Messenger, Mailer,Remailer,FireWall 5 target - user
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    XRTL - eXtended Run-Time Library for Delphi.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    xPG was about an OpenPGP-GUI in Java. Some source-code is still available for reference purposes. See http://www.cryptix.org/ for a current implementation of OpenPGP for Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    egrsa

    egrsa

    rsa-elgamal comparison

    compare time of process between rsa and elgamal algorithm used to encryption and digital signature.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    View and edit your ELF object file. Useful for plugin-based architectures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A simple demonstrative command line tool which can do both file encryption and decryption . It is based on OpenSSL and can support AES / DES / 3DES / BLOWFISH / RC4 cipher algorithms with ECB / CBC / CFB / OFB chaining modes (ECB only for RC4).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Encrypt emails using gpg and php.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A secure PKI-based client/server encrypted chat engine under development in Java. Encryption will be supported via JCE and PKCS#11. A simple Java interface can be implemented by other projects wishing to develop a Java GUI or CLI for the client.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    encr

    encr

    A symmetric-key cryptosystem implementation in VB.NET..

    Source code and further info on GitHub: https://github.com/toplel/encr
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Encrypt-roller is a encryption/decryption package. The goal of the project is to incorporate multiple encryption schemes and mechanisms to provide security and validity for files being stored or transferred.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Open Source Encryption and digital signature libraries for JMS. These librararies are writen in java and are to support secure integration through middelware/ISB/ESB
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Flash/PHP adaptation of the XTEA encryption algorithm. Allows encryption/decryption of sensitive data using 128-bit key. May be used for network data (HTTP) or offline for implementations like secure CD-ROM projects.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    faas is a federated authentication and authority server
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A Collaborative Attack on Complexity to Create a New Global Way of Life
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    file digest

    A command-line utility for calculating and verifying file checksums.

    Digest is a command-line utility which can be used to calculate and verify checksums of any files, similar to md5sum or RHash, but using modern hash algorithms. Supported algorithms: BLAKE, BLAKE2, Grøstl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, Skein, SM3, Streebog, Whirlpool. Usage: digest [-c] <algorithm> <filename(s)> For example, if you want to calculate the checksums using skein512/256 algorithm, use this command: digest skein512/256 * > checksums.skein To verify the checksums: digest -c skein512/256 checksums.skein You can get a full list of supported algorithms and test the performance of different algorithms on your PC using the command: digest test <iterations> <filename> This will calculate hash sum of <filename> multiple times (number of times is specified by <iterations>) and output the results with precise timings. Note: if you have a 64-bit operating system, use 64-bit binary of the utility, because it is significantly faster for large files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    fm (file masker) is an easy-to-use command line cryptographic tool that's small, portable across operating systems, quite secure for most purposes, and licensed to you along with its source code under the gpl.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    fiskalizacija

    Java code for signing and handling Croatian fiscal service requests

    Java code for signing and handling requests for Croatian fiscal service. Includes unsigned and signed xml samples. For completeness of project my personal testing key is included. Units tests with sample data are available for the ease of use. Whole Eclipse project is committed to source forge Git. Commercial support for implementation into different java application is available upon request. Enjoy
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB