Showing 3 open source projects for "secure hash algorithm"

View related business solutions
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • 1
    Digital Signer (a PDF Signing software)

    Digital Signer (a PDF Signing software)

    Digital Signature & eSigning software. Bulk PDF signing. Sign all Page

    Digital Signer is a powerful and user-friendly software designed to secure and sign your digital documents with ease. Ideal for Tender filling, individuals, businesses, and professionals, this software ensures that your sensitive documents are protected from unauthorized editing and tampering, maintaining their integrity and authenticity. Key Features Sign PDFs with Hardware Devices: Ensuring the highest level of security. Digital Signature Certificates (DSC): Apply digital...
    Leader badge
    Downloads: 36 This Week
    Last Update:
    See Project
  • 2
    encr

    encr

    A symmetric-key cryptosystem implementation in VB.NET..

    Source code and further info on GitHub: https://github.com/toplel/encr
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Secure P2P Instant Messenger running on .NET Framework 2.0. Uses server to store user information (user name, password, email address, friends list, log in state, IP address) in encrypted form. Uses custom designed symmetric encryption algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next