Search Results for "encryption algorithm java" - Page 12

Showing 869 open source projects for "encryption algorithm java"

View related business solutions
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1

    mpz_aprcl

    MPZ APRCL can prove the primality of numbers, written in C and GMP.

    This code contains an implementation of the APR-CL primality proving algorithm. It is a conversion of the Java based APRT-CLE written by Dario Alpern, who had written his based on the UBASIC version from Yuji Kida. This version incorporates improvements based on Jason Moxham's APR-CL code, which greatly reduced run-time memory requirements. mpz_aprcl is meant to be compiled on systems that support C, GMP, and a 64-bit data type.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2

    mpz_aprcl32

    MPZ APRCL32 can prove the primality of numbers, written in C and GMP.

    This code contains an implementation of the APR-CL primality proving algorithm. It is a conversion of the Java based APRT-CLE written by Dario Alpern, who had written his based on the UBASIC version from Yuji Kida. This version incorporates improvements based on Jason Moxham's APR-CL code, which greatly reduced run-time memory requirements. mpz_aprcl is meant to be compiled on systems that support C, GMP, and a 64-bit data type.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    CrypPic
    CrypPic is a free software application based on Java 8 which can be used to encrypt and manipulate the image.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    An easy-to-implement library that can assist Java developers in using the GeoHash algorithm in order to create geocodes based on custom latitude and longitude values. With the help of jGeohash, software developers will be able to quickly and easily generate a geohash code using user-defined latitude and longitude values. By using the GeoHash algorithm, the space can be divided into multiple grid shapes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • 5
    gsg.networks

    gsg.networks

    A simple native java network library

    A simple native java network library containing ftp, smtp and port knocking clients. Designed to be easily extended or customized this library will adapt smoothly in any java project
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    BONESA
    BONESA is an open source, user-friendly interface for tuning the numerical parameters of metaheuristics. This package includes a multi-objective parameter tuning algorithm and visualizations of the performance landscape.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    AleHu

    AleHu

    Encrypting, anonymous, unlimited size message transfer system

    AleHu is an open source encrypted message transfer system that encompasses both server (PHP) and client software (Java). Give it a shot: You can try out AleHu by simply running the client using the preconfigured AleHu test server! For further details and instructions on how to quickly install and run AleHu, have a look at the documentation in the Wiki section.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    VCipher

    VCipher

    A Social Media Encryption/Decryption Tool

    VCipher is a unique encryption and decryption tool.The code is not unique rather it is quite simple as it uses Vigenère cipher algorithm but the idea is quite unique.It is created to be used as an extra layer of protection for social networking sites,so even if someone's account is hacked it will take them so expertise to read those messages.And if used correctly it can also be made uncrackable if used correctly.This is a CLI(Command Line Interface) there is a web version too. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    SuperSync

    SuperSync

    A file synchronization/backup utility

    A file synchronization/backup utility. Designed to synchronize two folders. It can be used as a backup by synchronizing to a backup source. You can synchronize multiple computers to the same storage source. Includes FTP, SFTP and FTPS support.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Cloud-based help desk software with ServoDesk Icon
    Cloud-based help desk software with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • 10
    CrocodileNote

    CrocodileNote

    Protect your privacy!

    Take simple text notes. You can put them into folders to create your own quick, easy and robust file structure. CrocodileNote uses AES encryption. In encryption mode all data is encrypted using password-based encryption (PKCS#5) with AES-256. These are common industry-proven standards! Use encryption if you want to protect your data and your privacy!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Cube Password Manager

    Cube Password Manager

    A secure and light-weight password manager

    ...Should you encounter a bug I will be glad to help, but I can't guarantee any major updates for it. UPDATE: Various improvements to the GUI, a new and much stronger encryption algorithm as well as a new login screen.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Pambaf

    Pambaf

    Another encryption algorithm

    Pambaf is a new encryption algorithm for users or developers with extremely high demands for security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    backdup

    backdup

    BackDup is a Duplicity front-end for MacOS and Linux

    BackDup is a Duplicity (http://duplicity.nongnu.org/) front-end for MacOS and Linux written in Java. Duplicity creates bandwidth-efficient backup using the rsync algorithm. Mac OS users: please install Duplicity via macports (https://www.macports.org/) Linux users: install Duplicity via your package manager as usual.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    CryptoPad v1.0

    CryptoPad v1.0

    AES-128 bit file encryptor

    CryptoPad is a Java based file encryptor ! It can encrypt every type of file. The icing on the cake is that it's 100% cross-platform. i.e. You can run the same .jar file on Windows, Mac OS, Linux and any OS capable of running JRE 8 :) CryptoPad uses AES-128 bit symmetric key encryption to secure your data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    TEACryptor

    TEACryptor

    Encrypts text files

    Uses the Tiny Encryption Algorithm to encrypt text files. This program can only encrypt text files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    PetriOpti

    PetriOpti

    Petri network optimization with Martinez-Silva algorithm

    A simply application in order to demonstrate Martinez-Silva optimization algorithm on Petri networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    fastupload

    The fastest form-based file upload java programming component

    The component is based on RFC1867, written for java and j2ee development zone. It uses high performance byte-search algorithm to parse the submitted request, afterward save data into the file system. also, it provides a smart resolution to resolve the encoding issue for uploading text file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    SafePassDB

    SafePassDB

    Protect your personal data with SafePassDB.

    If you are forgetful and want to store all of your personal data securely on your PC without internet connection then SafePassDB is definitely for you! SafePassDB is a free multi-platform software application written in Java programming language that will enable you to protect all of your personal data with one "Master Password" using AES (Advanced Encryption Standard). SafePassDB is light weight and super easy to use! Current version of the software uses 128 bit AES (Advanced Encryption Standard) algorithm, which is a standard by U.S. National Institute of Standards and Technology (NIST), for protecting your personal data. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    A2y

    Automated Algorithm Synthesis

    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    JCRYPT Java Web Service Client

    JCRYPT Java Web Service Client

    JCRYPT - JMasters Encryption/Decryption Service

    The JCRYPT client make it easy and convenience to consume JCRYPT Web Service which enables encryption/decryption of your data with intuitive command line tool or Java API both packed as single very small jar file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This project is an extended implementation of Knuth's "Dancing Links" algorithm and some use cases (e.g. Sudoku).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Kirmah
    Encryption with symmetric-key algorithm Kirmah - generate keys with exotic chars - redefine key length - key mark to ensure decryption capabilities - mix data - fast with multiprocessing - possible compression - gui on gtk3 - cli tool - python3 DEPENDENCIES : ======== python3, python-gobject, gobject-introspection, pygtk 3 modes are available to encrypt : ======== - compression (full / disabled or only final step) - random (simulate a random order - based on crypted key - to randomize data) - mix (mix data according to a generated map - based on crypted key - with addition of noise) Process is as follow : ======== encrypt : file > [ compress > ] encrypt > [randomiz data > mix data > compress > ] file.kmh decrypt: file.kmh > [ uncompress > unmix data > unrandomiz data] > decrypt > [uncompress > ] file ======== for encrypt/decrypt large binary files, use the fastest alternative : split/merge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    evotopo

    Evolving Realistic Topologies for Wireless Network Simulation

    ...The softare evoTopo is able to generate multiple different topologies based on a given reference example, typically from a real-world setup. Based on this an evolutionary algorithm evolves new topology files with equal parameters regarding node density, distribution homogeneity and network properties such as node degree distrbution. evoTopo can be used with any wireless network simulator that will accept a node position file of some form. The reference file must be given in .csv format listing the x- and y-coordinates of the nodes. evoTopo is written in Java and will run on Java 6 or higher. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    ImpraStorage

    ImpraStorage

    ImpraStorage provided a private imap access to store large files

    ImpraStorage provided a private imap access to store large files. Each file stored on the server is split in severals random parts. Each part also contains random noise data (lenght depends on a crypt key) to ensure privacy and exclude easy merge without the corresponding key. An index of files stored is encrypt (with the symmetric-key algorithm Kirmah) and regularly updated. Once decrypt, it permit to perform search on the server and download each part. transfert process is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    xxteac - XXTEA Encrypter/Decrypter

    xxteac - XXTEA Encrypter/Decrypter

    This xxteac program utilizes the "Corrected Block TEA" encryption/decryption algorithm by Roger Needham and David Wheeler. The original algorithm has been slightly modified to allow arbitary length passwords / password files.
    Downloads: 0 This Week
    Last Update:
    See Project