Search Results for "encryption algorithm java" - Page 17

Showing 860 open source projects for "encryption algorithm java"

View related business solutions
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 1
    spantus
    Spantus - signal(speech) analytical tool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    HTML Encrypter

    HTML Encrypter

    Java based HTML encrypter and decrypter

    An encryption and decryption application developed in Java. The application uses a number of algorithms to encrypt and decrypt the HTML source code: Blowfish, AES, TEA, Rabbit, MARC 4, Escape/Unescape functions. In addition to the encryption and decryption functions, the application also returns the source code of a website. The user has the ability to upload the encrypted file, using the FTP transfer feature, to his or hers personal website. Additional features are listed below.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Here are implementations of the Dual Contouring algorithm (SIGGRAPH 2002, see http://www1.cse.wustl.edu/~taoju/research/dualContour.pdf). The C++ code was co-developed by Tao Ju and Scott Schaefer, and Java port is done by Jean-Denis Boudreault.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    NitroCache

    Extremely fast, scalable, concurrent, pure Java In-memory cache

    One of the fastest, 100% Pure Java In-memory cache. Its aimed at providing very fast, light, highly scalable cache with high concurrency. The fetch operation from cache are always in constant time, O(c), irrespective of the number of threads accessing the cache or cache size. NitroCache uses unique custom algorithm inspired by Btree, skiplist and hashing to deliver a constant time cache with lock-less fetches. For details on using NitroCache, please visit wiki section Note...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Turn Your Content into Interactive Magic - For Free Icon
    Turn Your Content into Interactive Magic - For Free

    From Canva to Slides, Desmos to YouTube, Lumio works with the tech tools you are already using.

    Transform anything you share into an engaging digital experience - for free. Instantly convert your PDFs, slides, and files into dynamic, interactive sessions with built-in collaboration tools, activities, and real-time assessment. From teaching to training to team building, make every presentation unforgettable. Used by millions for education, business, and professional development.
    Start Free Forever
  • 5

    Galois sub-hierarchy builder

    Visualize Galois sub-hierarchy of 2d matrix

    GSH builder is a free Galois Sub-Hierarchy visualization tool. The algorithm for calculating GSH is called Pluton and the present Java realization is based on two articles. "Efficiently computing a linear extension of the sub-hierarchy of a Concept Lattice" by Anne Berry, Marianne Huchard, Ross M. McConnell, Alain Sigayret and Jeremy P. Spinrad. "Performances of Galois Sub-hierarchy-building algorithms" by Gabriela Arevalo, Anne Berry, Marianne Huchard, Guillaume Perrot...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A cross platform steganography software written completely in java, with a juicy AES support. The project is pretty extensible, so new smarter steganography algorithms's are fully implementable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Sudoku Cracker

    Sudoku Cracker

    Sudoku puzzle cracker with User Interface (Java)

    Sudoku cracking algorithm with a convenient user interface with drop down options to fill up the grid. (Java platform)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Stegno

    This project is created for providing basic stegnography concept.

    THESE PROGRAMS JUST PROVIDES BASIC Stenography CONCEPT. ENCRYPTION 1. RUN Encryptor.CLASS (WITH APPROPRIATE JAVA ENV.) 2. PROVIDE APPROPRIATE PARAMETERS. • source_file_name : (NAME OF FILE TO WHICH target_file_name IS TO BE EMBEDDED) • target_file_name : (NAME OF FILE WHICH SHOULD BE EMBEDDED ) • output_file_name : (NAME OF OUTPUT FILE) e.g. java Encryptor original.mp3 hideme.mp3 hidden.mp3 (space will be used for separating parameters) [source_file_name] [target_file_name...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Java implementation of Shamir's Secret Sharing algorithm as described in Applied Cryptography [as LaGrange Interpolating Polynomial Scheme].
    Downloads: 0 This Week
    Last Update:
    See Project
  • Crowdtesting That Delivers | Testeum Icon
    Crowdtesting That Delivers | Testeum

    Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.

    Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights.
    Click to perfect your product now.
  • 10

    Genetic Basis

    A general genetic algorithm framework

    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    BayesianCortex

    BayesianCortex

    simple algorithm for a realtime interactive visual cortex for painting

    A paint program where the canvas is the visual cortex of a simple kind of artificial intelligence. You paint with the mouse into its dreams and it responds by changing what you painted gradually. There will also be an API for using it with other programs as a general high-dimensional space. Each pixel's brightness is its own dimension. Bayesian nodes have exactly 3 childs because that is all thats needed to do NAND in a fuzzy way as Bayes' Rule which is NAND at certain extremes. NAND can be...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    CRF is a Java implementation of Conditional Random Fields, an algorithm for learning from labeled sequences of examples. It also includes an implementation of Maximum Entropy learning.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13

    WiFi Location Tracking

    Location tracks objects based on SSID strength in 2D environments

    This simple algorithm gives an example of location tracking in indoor environment using WiFi signals strengths sent to a local sever machine which then determines the clients location.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Bracer

    Bracer

    Repository has been moved to: http://dtitov.github.com/bracer

    Java library for parsing and evaluating math expressions. Javadoc is available at http://bracer.sourceforge.net/javadoc/ P.S. This library depends on Apache Commons Math, so don't forget to include commons-math-2.2.jar to your project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    Recursive to Iterative in Java

    Recursive to Iterative in Java

    converting java recursive methods to iterative ones. for educational purposes ,i didn't say much about the algorithm because this can be an interesting field of research for B.S. students.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    JCRCGen

    JCRCGen

    Generates Java source code for the CRC algorithm.

    JCRCGen is a tool written completely in Java that will output public domain Java source code containing both the simple and table-driven implementations of the Rocksoft Model CRC algorithm. Generator polynomials may be any 8-bit multiple between 8 and 64 bits.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Tcp/Ip API Wrapper

    TCP/IP API (SSL Encryption, ZLIB Compression)

    TCP/IP connectivity warpped in an API extended to provide the following major features: SSL Encryption, ZLIB compression, packet oriented mode rather stream oriented mode. Asynchrounous. One liner to declare server or connect to server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A library written in Java and C# for crypt,encrypt and generate key pairs using the ElGamal algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    KonEncriptación

    KonEncriptación

    Encryption tool for Dropbox

    It's a new, free distribution encryption software that provides Dropbox users with additional security for their sensitive information. Encrypt and securely share your files with other KonEncriptación users via Dropbox. KonEncriptación is fully integrated with Dropbox and is easy to use, thus allowing you to exploit all its features from the start.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    OpenSource Java based cross platform command line file encryption software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    RSAmake

    RSAmake

    An Cryptography software with RSA algorithm

    An Cryptography software with RSA algorithm RSAmake using Python and WxPython written
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    SimpleHTTPDB is a client based key-value database that allows for storing data on any http-server via FTP. This way, no server-based functionality is required. Security of the data is provided by high-level encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    puff

    puff

    Fast and Strong Data Encryption Algorithm

    svn checkout http://umcipher.googlecode.com/svn/trunk/ umcipher-read-only
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    FactHash

    Factorial Hashing Function

    ... than the block size. I hold no guarantee of the security of this algorithm, USE AT YOUR OWN RISK. I have had no 3rd party analysis done on the algorithm to date, but research is welcome, and a challenge is even provided in CHALLENGE.txt.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    j-Algo is an algorithm visualization tool, especially useful for students and lecturers of computer science. It is written in Java and platform independent. j-Algo is developed at Dresden University of Technology.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.