Open Source Java Cryptography Software - Page 15

Java Cryptography Software

View 5680 business solutions

Browse free open source Java Cryptography Software and projects below. Use the toggles on the left to filter open source Java Cryptography Software by OS, license, language, programming language, and project status.

  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    Project Sypher is a Java program that is intended to take a document and cipher the text, output the result in a new document and delete the original file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Szyfrator i deszyfrator pliku za pomoca algorytmu MARS
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    The CDSA Java Interface project allows you to use CDSA services as JCA-JCE services from your Java applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 5
    TSEFS is an encrypting filesystem.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A client-server-system for distributively editing and signing documents. (technologies: Java, Java Servlets / JSPs, EJBs)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    An implementation of a Non-Interactive Zero knowledge Proof system to be used in a voting simulation software, as part of our BCS project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Tcp/Ip API Wrapper

    TCP/IP API (SSL Encryption, ZLIB Compression)

    TCP/IP connectivity warpped in an API extended to provide the following major features: SSL Encryption, ZLIB compression, packet oriented mode rather stream oriented mode. Asynchrounous. One liner to declare server or connect to server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Text Encryption and Decryption

    Text Encryption and Decryption

    Anoncrypt-Text Encryption and Decryption Website in Java(Struts2)

    Anoncrypt by HTCoders is a web based Text Encryption and Decryption Project using Java Technology following Struts2 Framwork . It Consist of two modules > Password based Encryption (Symmetric Encryption) > Self-Destructible Message Service (Once the message is read , it is destroyed and cant be decrypted again .)
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    The goal of this project is to develop a network protocol (Peer Instant Messenger Protocol, PIMP) that creates a distributed, peer-to-peer network for the transmission of instant messages, along with a graphical client that will allow users to access the
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    This is a java based encryption program that can encrypt any file you point it to.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The Hopefully Uncomprehensible Shell, HUSH, is a secure shell client and programming library written in and for Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The NEO Project uses the NEO-c (Network Exchange Operation for Charity) platform to participate in various computing challenges and projects, and donates any winnings to the charities specified by its users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The Watermarks is a java library for images and text watermarking fingerprinting and tamper-proofing. The supported carrier formats for a watermark are JPEG and PDF. The project also aim to build a test environment to evaluate robustness of implemented a
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This package is a modest implementation of a non-alphanumeric encryption algorithm in java. But I'm kinda looking forward to creating a whole gui app implementing most well-known encryption tools, "the paranoid secret-coder special brainkiller"!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Thumbnail steganography creates a thumbnail from a source image and stores data in it by altering it's color channels. To decipher the data, a new thumbnail is made from the original image and the differences between the pixels are calculated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    With Tiger Envelopes you can stop snoops from reading your email. Same email client. No extra steps. One click to install on Windows and Linux. Configures Outlook, Thunderbird, and KMail. Supports GPG, PGP, Bouncy Castle encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Tombo Edit is an Android application to view and edit files encrypted by Tombo (http://tombo.sourceforge.jp/En/)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Tristero is a framework for creating distributed peer-to-peer file sharing applications. It uses standard technologies for each component, reducing the work of implementing a particular network architecture to the novel aspects of that system and eliminat
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    jTcGui is a Java Tool for managing TrueCrypt volumes on Linux. Requires TrueCrypt and JAVA 6 installed to run.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Twinkle

    Twinkle

    Twinkle is an open-source text editor.

    Twinkle is an open source text editor that saves the documents in an encrypted form.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    U-Tranz

    U-Tranz

    UDP based secure file transfer application written in JAVA.

    U-Tranz is a free application developed on the characteristics of UDP allows the transmission of unlimited file size. Most of the applications based on UDP restrict file sharing upto 64kb which makes transmission less efficient on large files. Along with the tremendous increase in file size, certain features like implementation of Government Standard Security Algorithms (AES-256*/RSA-2048 and SHA-512) have been added to this application for secure sharing of huge files across different workstations.This tool programmed in JAVA and requires Java Runtime Environment to use this tool. *Unlimited Strength Java Cryptography Extension Policy Files for the Java SE Runtime Environment 7 required to use this feature.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    USSI is the Universal SAFE Signing Interface. USSI provides web services for the application of SAFE digital signatures for PDF, text, xml, etc. Please see http://www.safe-biopharma.org for more information on SAFE.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Urutau
    Algoritmo / classe de criptografia em JAVA
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    An electronic votingsystem – Verifiable E-Voting (VEV) – with underlying protocol to help secure the election process from malicious practices at the same time as allowing voters and candidates to verify the correctness of their votes.
    Downloads: 0 This Week
    Last Update:
    See Project