Showing 2 open source projects for "encryption algorithm"

View related business solutions
  • Level Up Your Cyber Defense with External Threat Management Icon
    Level Up Your Cyber Defense with External Threat Management

    See every risk before it hits. From exposed data to dark web chatter. All in one unified view.

    Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
    Try for Free
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 1
    Wesh Network Toolkit

    Wesh Network Toolkit

    Async Mesh Network Protocol for Extreme Communication

    ...Wesh provides a secured, distributed and asynchronous communication protocol, both with or without internet access using IPFS and direct transports such as BLE and proximity drivers. Wesh Protocol provides end-to-end encryption and perfect forward secrecy for all the exchanged messages. Distributed p2p transmissions and hosting over IPFS powered by CRDT algorithm. Efficient end-to-end encryption and perfect forward secrecy to prevent eavesdropping and provide reliable identity access management. Distributed authentication and authorization. Multiple devices per identity. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    GmSSL

    GmSSL

    Password toolbox that supports national secret

    GmSSL is an open source library of domestic commercial ciphers independently developed by Peking University. It realizes comprehensive functional coverage of national secret algorithms, standards, and secure communication protocols. It supports mainstream operating systems and processors including mobile terminals, and supports cryptographic keys, Cipher cards and other typical domestic cryptographic hardware provide feature-rich command line tools and multiple compiled language programming...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next