Search Results for "encryption algorithm java" - Page 12

Showing 861 open source projects for "encryption algorithm java"

View related business solutions
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 1
    CrocodileNote

    CrocodileNote

    Protect your privacy!

    Take simple text notes. You can put them into folders to create your own quick, easy and robust file structure. CrocodileNote uses AES encryption. In encryption mode all data is encrypted using password-based encryption (PKCS#5) with AES-256. These are common industry-proven standards! Use encryption if you want to protect your data and your privacy!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    VCipher

    VCipher

    A Social Media Encryption/Decryption Tool

    VCipher is a unique encryption and decryption tool.The code is not unique rather it is quite simple as it uses Vigenère cipher algorithm but the idea is quite unique.It is created to be used as an extra layer of protection for social networking sites,so even if someone's account is hacked it will take them so expertise to read those messages.And if used correctly it can also be made uncrackable if used correctly.This is a CLI(Command Line Interface) there is a web version too. VCipher Web...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    CryptoPad v1.0

    CryptoPad v1.0

    AES-128 bit file encryptor

    CryptoPad is a Java based file encryptor ! It can encrypt every type of file. The icing on the cake is that it's 100% cross-platform. i.e. You can run the same .jar file on Windows, Mac OS, Linux and any OS capable of running JRE 8 :) CryptoPad uses AES-128 bit symmetric key encryption to secure your data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    fastupload

    The fastest form-based file upload java programming component

    The component is based on RFC1867, written for java and j2ee development zone. It uses high performance byte-search algorithm to parse the submitted request, afterward save data into the file system. also, it provides a smart resolution to resolve the encoding issue for uploading text file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Sales CRM and Pipeline Management Software | Pipedrive Icon
    Sales CRM and Pipeline Management Software | Pipedrive

    The easy and effective CRM for closing deals

    Pipedrive’s simple interface empowers salespeople to streamline workflows and unite sales tasks in one workspace. Unlock instant sales insights with Pipedrive’s visual sales pipeline and fine-tune your strategy with robust reporting features and a personalized AI Sales Assistant.
    Try it for free
  • 5
    Pambaf

    Pambaf

    Another encryption algorithm

    Pambaf is a new encryption algorithm for users or developers with extremely high demands for security.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    PetriOpti

    PetriOpti

    Petri network optimization with Martinez-Silva algorithm

    A simply application in order to demonstrate Martinez-Silva optimization algorithm on Petri networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    A2y

    Automated Algorithm Synthesis

    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    TEACryptor

    TEACryptor

    Encrypts text files

    Uses the Tiny Encryption Algorithm to encrypt text files. This program can only encrypt text files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This project is an extended implementation of Knuth's "Dancing Links" algorithm and some use cases (e.g. Sudoku).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Turn Your Content into Interactive Magic - For Free Icon
    Turn Your Content into Interactive Magic - For Free

    From Canva to Slides, Desmos to YouTube, Lumio works with the tech tools you are already using.

    Transform anything you share into an engaging digital experience - for free. Instantly convert your PDFs, slides, and files into dynamic, interactive sessions with built-in collaboration tools, activities, and real-time assessment. From teaching to training to team building, make every presentation unforgettable. Used by millions for education, business, and professional development.
    Start Free Forever
  • 10

    evotopo

    Evolving Realistic Topologies for Wireless Network Simulation

    There is a need for realistic node topologies for simulating and testing wireless network protocols. The softare evoTopo is able to generate multiple different topologies based on a given reference example, typically from a real-world setup. Based on this an evolutionary algorithm evolves new topology files with equal parameters regarding node density, distribution homogeneity and network properties such as node degree distrbution. evoTopo can be used with any wireless network simulator...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SafePassDB

    SafePassDB

    Protect your personal data with SafePassDB.

    ... Encryption Standard) algorithm, which is a standard by U.S. National Institute of Standards and Technology (NIST), for protecting your personal data. IMPORTANT: In order to run SafePassDB you need to have Java installed on your computer. Java is free and can be downloaded from - http://www.java.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    JCRYPT Java Web Service Client

    JCRYPT Java Web Service Client

    JCRYPT - JMasters Encryption/Decryption Service

    The JCRYPT client make it easy and convenience to consume JCRYPT Web Service which enables encryption/decryption of your data with intuitive command line tool or Java API both packed as single very small jar file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    CryptoDock

    CryptoDock

    CryptoDock is a tool that hosts various crypto. algorithms.

    CryptoDock is free multi-platform application written in Java that hosts various hash and modern cryptographic algorithms you can use to protect your sensitive data on your computer. Available cryptographic algorithms: 1. NLSE-1 2. One Time Pad 3. AES Available hashing algorithms: 1. MD5 2. SHA-1 3. SHA-256 4. SHA-512 IMPORTANT: In order to run CryptoDock you need to have Java installed on your computer. Java is free and can be downloaded from - http://www.java.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    fusie

    Fuzzy scala inference engine

    Rewriting from Java to Scala and improving my university project on course Artifical Intelligence Systems. About project in russian: http://brunneng.blogspot.com/2013/06/fuzzy-scala-inference-engine-fusie.html Can be used from maven: <dependency> <groupId>net.sf.brunneng.fusie</groupId> <artifactId>fusie</artifactId> <version>0.8.1</version> </dependency>
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    phenotemp

    phenotemp

    phenological trends using NOAA AVHRR time series

    Starting from GIMMS values as ascii data (each line will be treated as individual time series), the application can smooth the ts - values by applying different algorithm that are based on Fouriertransformation. Separation of seasonal figure as well as the detection of linear trends is possible. Possible breaks in longterm mean can be detected with a change-point analysis using CuSum algorithms. Phenological events such as start-of-season, day-of-max/day-of-min, end-of-season can be determined...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Kirmah
    Encryption with symmetric-key algorithm Kirmah - generate keys with exotic chars - redefine key length - key mark to ensure decryption capabilities - mix data - fast with multiprocessing - possible compression - gui on gtk3 - cli tool - python3 DEPENDENCIES : ======== python3, python-gobject, gobject-introspection, pygtk 3 modes are available to encrypt : ======== - compression (full / disabled or only final step) - random...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ImpraStorage

    ImpraStorage

    ImpraStorage provided a private imap access to store large files

    ImpraStorage provided a private imap access to store large files. Each file stored on the server is split in severals random parts. Each part also contains random noise data (lenght depends on a crypt key) to ensure privacy and exclude easy merge without the corresponding key. An index of files stored is encrypt (with the symmetric-key algorithm Kirmah) and regularly updated. Once decrypt, it permit to perform search on the server and download each part. transfert process is transparent...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Infinium-8

    CryptoNote based currency. Increasing block reward

    Infinium-8 (INF8) is a new privacy-centric coin using the CryptoNote protocol. Infinium-8 was launched 7/18/2014 12:00 UTC Specifications PoW algorithm: CryptoNight [1] Max supply: Infinite Block reward: increasing with difficulty growth [2] Block time: 90 seconds Difficulty: Retargets at every block [1] CPU + GPU mining (about 1:1 performance for now). Memory-bound by design using AES encryption and several SHA-3 candidates. [2] Infinium-8 s the cryptocoin with block reward...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Java File Uploader
    Please update v 2.0 if you have downloaded before 16th Feb 2014! Simple java file uploader. The main goal to overcame 2GB browser limit. * Simple GUI * Upload unlimited file sizes from client to server via HTTP * Split uploading file to chunks * MD5 chunk verification on server. Final MD5 confirmation. * Http auth Adv: https://play.google.com/store/apps/details?id=org.vikulin.etherwallet
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Machine learning library that performs several clustering algorithms (k-means, incremental k-means, DBSCAN, incremental DBSCAN, mitosis, incremental mitosis, mean shift and SHC) and performs several semi-supervised machine learning approaches (self-learning and co-training). --------------------------------------------------------------------------- To run the library, just double click on the jar file. Also, you can use the following command line: Java -Xms1500m -jar "ML Library.jar...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Extract Objects from Image

    Connected Component Labeling Algorithm - Extracting Objects From image

    fast Connected Component Labeling Algorithm - java application - Extracting Objects From image
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    CodeSounding is a sonification framework which makes possible to hear how any existing Java program "sounds like", by assigning instruments and pitches to code statements (if, for, etc) so that the flowing of execution is played as a flow of music.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Open Door Logistics

    Open Door Logistics

    Open source software for territory design

    ... management for sales or delivery territories based on sales, workload, etc. - Design territories visually by simply ‘painting‘ them on the map using your mouse. - Sophisticated territory mapping allows you to colour and shade your territories. - Automatically optimise territories using a powerful algorithm. - Generate sophisticated PDF reports.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24

    xxteac - XXTEA Encrypter/Decrypter

    xxteac - XXTEA Encrypter/Decrypter

    This xxteac program utilizes the "Corrected Block TEA" encryption/decryption algorithm by Roger Needham and David Wheeler. The original algorithm has been slightly modified to allow arbitary length passwords / password files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    CryptoX

    AES Encryption Program

    v2.0.0 (Latest) ---CHANGE LOG--- v1.0.0 - Original Release v1.0.1 - Source Code Cleanup v2.0.0 - Now Features File Encryption Protect your privacy! Encrypt your messages and files with a cryptographic strength of up to 256 bits before sending them to others!
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.