Showing 58 open source projects for "encryption algorithm java"

View related business solutions
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • 1

    Recursive to Iterative in Java

    Recursive to Iterative in Java

    converting java recursive methods to iterative ones. for educational purposes ,i didn't say much about the algorithm because this can be an interesting field of research for B.S. students.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    GlabUke creates ukulele tabs and transposes it easily. It also offers a algorithm that finds the easiest transposition. Guk files can be exported as PDF for quality printing. Other features are planned for the future, such as addings lyrics.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    JAF es un framework que posibilita a los programas Java el acceso a archivos de registros de longitud fija. Está pensado para uso didáctico para facilitar la enseñanza del lenguaje de programación Java en materias de Algoritmos y Programación.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    openSMS4 was created by tao.tang316 and implemented in C, which is an open source implementation of the SMS4 encryption algorithm (including simple checking codes).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    JCrypTool Plug-ins
    JCrypTool moved to GitHub! See https://groups.google.com/d/topic/jcryptool-developers/nauEXL6vsbk/discussion for more information and visit our new project home at https://github.com/jcryptool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Optimum Path Calculator
    Simple UI to test the effectiveness of a heuristic algorithm against the brute force method for path finding among an arbitrary number of arbitrarily placed points on a grid. This is an educational project, don't expect new and better methods.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    jg3d
    Pure Java implementation of an interactive 3d graph rendering engine and editor using a spring embedder algorithm. Nice looking sterile real time 3d environment. Feel free to extend our project and build something awesome, just let us know please :D
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    JMS/Joram implementation of the Bully election algorithm. It is a library to be used by a process' implementation to make it transparently manage coordinator's elections, while it carries out business logic. A sample application is included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A particle swarm optimization demo written by students in the digital communication msc program (2010) at uni-kiel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Maui is a multi-purpose automatic topic indexing algorithm. Given a document, Maui automatically identifies its topics. Depending on the task topics are tags, keywords, keyphrases, vocabulary terms, descriptors or Wikipedia titles.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    M.A.N.G.
    Marc's Awesome Name Generator is a Java based library to allow the easy and fast generation of random first, middle and last names based on user-definded criteria, such as culture of origin or contained letters.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    We propose a metabolic pathway drawing algorithm for reducing the number of edge crossings by considering the fact that metabolic pathway graph is scale-free network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    G.A.V. (Graph Algorithm Visualizer) is a tool that visualizes algorithms from graph theory. A step-by-step visualization from each different algorithm allows the user to understand the particular algorithm very easily.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    SJEA version 1.0 - Simple Java Encryption Algorithm. SJEA is a simple command-line binary encryption algorithm (symmetric block cipher) written in JAVA. It uses a password and a byte-vector array to scramble the input file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    TraSim is a simple framework for the development of traffic algorithms, and the observation of their behaviour. It comes with an algorithm that handles traffic lights dynamically, based on the presence of cars and pedestrians. Both cars and pedestrians can be spawned randomly; however, user interaction is also supported for both entities (e.g. to control destination, crossing decisions). Features such as distributed user interaction were originally left as future work; however, interaction...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Java API for implementing any kind of Genetic Algorithm and Genetic Programming applications quickly and easily. Contains a wide range of ready-to-use GA and GP algorithms and operators to be plugged-in or extended. Includes Tutorials and Examples.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    Implementing and demonstrating the Dijkstra Algorithm for educational purposes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    This educational software simulates an Ad-hoc network with AODV algorithm, it uses a high level view and only works in Routing layer. it has a user-friendly graphical user interface and has been written in java language.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    The simpliZia-program implements the simplex-algorithm and is designed to help students of Operations Research to understand and learn the algorithm. This is a german project, source and program are actually written in german.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    SierpinskiChaosGame is a graphical Java application for demonstrating the creation of a Sierpinski triangle using a probabilistic algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    VeNCrypt adds TLS/X509 encryption and authentication to VNC. It is heavily based on the RealVNC Free Edition, thus being a single fork away from the original creators of VNC, and is fully compliant with the RFB protocol.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 22
    KNN-WEKA provides a implementation of the K-nearest neighbour algorithm for Weka. Weka is a collection of machine learning algorithms for data mining tasks. For more information on Weka, see http://www.cs.waikato.ac.nz/ml/weka/.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    The Eclipse XML-Security Plug-In allows you to experiment with the W3C recommendations on digital signatures and encryption and to learn all about their background. Arbitrary XML documents can be canonicalized, signed, verified and en- or decrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    jGABL (the Java Graph Algorithm Base Library) is a java library for the implementation of graph algorithms. It covers a hierarchy of graph concepts, various graph implementations, and algorithm animation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    CryptoHelper is a Java program designed to aid in the decryption of classical ciphers, ie pre WWII ciphers. It brings together tools like frequency analysis, friedman tests, enciphering/deciphering for several clasical ciphers, and brute force algorithm
    Downloads: 0 This Week
    Last Update:
    See Project