Search Results for "secure hash algorithm" - Page 3

Showing 124 open source projects for "secure hash algorithm"

View related business solutions
  • Level Up Your Cyber Defense with External Threat Management Icon
    Level Up Your Cyber Defense with External Threat Management

    See every risk before it hits. From exposed data to dark web chatter. All in one unified view.

    Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
    Try for Free
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • 1
    cg-invoice

    cg-invoice

    Invoice and office utilities program for customer managment

    cg-invoice is a HTML5, Bootstrap, PDO simple yet productive way to write invoices and then retrieve the client data in more than one way. Invoicing invoices from anywhere online. View table or you can reprint the invoice as it was originally written. Business management for quotes or estimates. Contacts and vendors listing tabs for easy search. Office or personal tools to track customers, inventory, mailing lists, company phone numbers with a scheduler calendar included. Scripts written...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    v1pad

    One-time-pad encryption using a virtual pad

    v1pad is a command-line tool that encrypts and decrypts files using one-time-pad encryption. v1pad uses a virtual pad, meaning that the one-time pad is generated dynamically based on user input instead of being stored in a file. The name v1pad is an abbreviation for Virtual One-Time Pad.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    ALEPH-w

    ALEPH-w

    Data structures and Algorithms library

    ...It contains the main data structures: single and double lists, special arrays (dynamic and of bits), many types of trees: multitrees, binary search trees, avl, red-black, randomized, treaps, splay and other interesting types. Several types of hash tables are implemented: separated chaining, open adressing with linear probing and double function hash; this last one has a garbage colector mechanism that allows to free deleted entries. Dynamic linear hash tables are implemented too. The main algorithms on graphs are implemented in an easy way and with good performance features. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    file digest

    A command-line utility for calculating and verifying file checksums.

    Digest is a command-line utility which can be used to calculate and verify checksums of any files, similar to md5sum or RHash, but using modern hash algorithms. Supported algorithms: BLAKE, BLAKE2, Grøstl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, Skein, SM3, Streebog, Whirlpool. Usage: digest [-c] <algorithm> <filename(s)> For example, if you want to calculate the checksums using skein512/256 algorithm, use this command: digest skein512/256 * > checksums.skein To verify the checksums: digest -c skein512/256 checksums.skein You can get a full list of supported algorithms and test the performance of different algorithms on your PC using the command: digest test <iterations> <filename> This will calculate hash sum of <filename> multiple times (number of times is specified by <iterations>) and output the results with precise timings. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 5
    casync

    casync

    Content-addressable data synchronization tool

    ...Let's call this directory a "chunk store". At the same time, generate a "chunk index" file that lists these chunk hash values plus their respective chunk sizes in a simple linear array. The chunking algorithm is supposed to create variable, but similarly sized chunks from the data stream.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    PeaUtils

    File management utilities: split & join, secure delete, crc/hash

    Suite of file management utilities: split and join files, secure delete, verify checksum and hash values: CRC32. MD5, SHA1, SHA-256, SHA3 and more. Spin-off of PeaZip project.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 7

    Xamp

    This is Xamp, a secure and platform independend media player.

    This is Xamp, the next generation of a skinnable and platform independent media player which based on the Doppio media framework: https://sourceforge.net/projects/doppio. The player supports various pluggable video and audio formats. Xamp is primarily intend to run as a native executable but can also run as a Java player version working with Java 1.1 VM or above. To ensure the best user experience, the Java version of Xamp doesn't use the Java Media Framework, the high level part...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Password Keeper

    Password Keeper

    manage your passwords in a secure way

    ...Because if you use only one password everywhere and someone gets this password you have a problem... A serious problem. The thief would have access to your e-mail account, website, etc. Unimaginable. Password Keeper helps you to manage your passwords in a secure way. You can protect all your passwords with Password Keeper . You only have to remember one single master password to unlock the application when it starts only. your login and passwords are encrypted using the best and most secure encryption algorithm currently known (AES).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    LDWM: Hash-Based Signatures (draft-mcgrew-hash-sigs-02), PHP implementation of IETF pqcrypto algorithm specification
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 10

    Dev-C++ for Homeworks

    Orwell Dev-Cpp with author authentication for homeworks

    Orwell Dev-C++ with author authentication. Perfect for student homeworks, if you don't want your students to copy their homework files from others. Authenticated files are regular source files with student's name and a security hash added at the end. Any cheating attempt by copying in the files / changing name will invalidate the hash and can be detected by the teacher. In addition, paste in authenticated files is only allowed from one's own files. The CheckHash.exe tool checks the...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    jPass - Cross-Platform Password Manager

    jPass - Cross-Platform Password Manager

    Compiled into a single .jar file. Tiny Password Manager. Portable

    I did not see a pre-built version of this software on the original developers Github project (https://github.com/gaborbata/jpass), so I am taking it upon myself to compile the releases as they come, so that others don't have to. --Description-- JPass is a simple, small, portable password manager application with strong encryption. It allows you to store user names, passwords, URLs and generic notes in an encrypted file protected by one master password. I will not add the source...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Gryptonite (formerly GPassword Manager)

    Gryptonite (formerly GPassword Manager)

    Simple but Powerful, Cross-Platform Password Management Utility

    ...Access your most-used passwords/URLs right out of a desktop tray icon. For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. Although the interface is simple and intuitive, the security is top-notch. It uses AES with CCM to secure and authenticate the data.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13

    HeaDDaCHe

    Hashed dynamic determinants for convex hulls

    Description: We propose and implement in C++ the hashed dynamic determinants scheme. This consists of efficient implementations of dynamic determinant algorithms and a hash table that stores intermediate results (matrices and determinants) in order to be used in subsequent steps of the algorithm. Related papers: V.Fisikopoulos, L.Peñaranda. Faster Geometric Algorithms via Dynamic Determinant Computation. In Algorithms – ESA 2012, Lecture Notes in Computer Science Volume 7501, 2012, pp 443-454.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Gryptonite

    Gryptonite

    Cross-platform encrypted password and file database

    ...Access your most-used passwords/URLs right out of a desktop tray icon. For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. It's not just easy to use, it's also highly secure. Security experts will be happy to know that it uses AES with CCM and has a solid security concept.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Diamond (DMD)

    Diamond (DMD)

    Diamond (DMD) is the digital wealth storage system.

    * 4.38 million total coins. * Cutting edge Grøstl algorithm. * Proof-of-Work block solving target time ~ 100 seconds. * Proof-of-Stake block solving target time ~ 100 seconds. * Very low transaction fee at 0.001. * Difficulty re-targets at every block. * Endless Hybrid Network Security. * Transaction Message technology. * Fast and secure transactions. * Provision for continuous promotion and development
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Cube Password Manager

    Cube Password Manager

    A secure and light-weight password manager

    ...Should you encounter a bug I will be glad to help, but I can't guarantee any major updates for it. UPDATE: Various improvements to the GUI, a new and much stronger encryption algorithm as well as a new login screen.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Checksum Directory

    Checksum Directory

    Check some checksum!

    A secure and centralized way to get checksums of common downloads. You will find the usual MD5 hash, but also the newer and more secure hashes like SHA-1, SHA-256 and even SHA-512. If the filesize and all up to four hashes match, you should be save to use that downloaded file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    QuazarCoin
    QuazarCoin (QCN) is a new cryptocurrency based on the CryptoNote and uses the CryptoNight algorithm. QuazarCoin protects your data and privacy with help of completely anonymous transactions with ring signatures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Mjollnircoin is a decentralized digital currency that enables instant payments to anyone in the world; it is a lite version of Bitcoin using a redundant cryptographic function as a proof-of-work algorithm. Mjollnircoin is a people's currency, intended to be efficiently mined with consumer-grade hardware. It is ultra secure, ASIC resistant, Multipool resistant and rare with a total number of 42 million mjollnircoins
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Use of Michael Rabin's Information Dispersal Algorithm to provide secure, dispersed storage in a networked environment. For full download, please get both Math-FastGF2 and Crypt-IDA releases under the files link. See project wiki for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Secure Hash Algorithm variant of the nist maintained Secure Hash Algorithm. this is a 1024 bit digest. Comments suggestions always welcome. Rick Removed old downloads as they are long outdated. The update is the last version I worked on. Algorithm is based on the SHA2 digest. I may work on an updated version for c++11
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Azrar

    Azrar

    Encryption addressing long-term data secrecy

    ...Azrar is a user-friendly tool for the encryption/decryption of single files - preferably compressed archives - addressing long-term data secrecy. Thus, Azrar provides the possibility to use webspace for secure data transfer between two communication/transfer partners (encryption only, network transfer not yet included in current version). Data in encrypted files are secret/private indefinitely. To achieve long-term data secrecy, Azrar differs from other approaches in terms of not to rely on effective computational deficiencies. It combines a one-time pad with a stream cipher method using the strong cryptographic hash function (family) Skein. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    J! Secure Password Hashes
    J! Secure Password Hashes provided an easy access to all Joomla! password hash algorithms and the Drupal 7 SHA-512 hashing algorithm. Compatible: Joomla! 2.5.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    PassWordFromHash

    Program generates passwords from hash, not from random numbers.

    Algorithm: 1. Concatenate "User", "Resource", "Master password" (yes, it is correct order!) to one string. 2. Calculate RIPEMD-160 hash of that string. 3. Convert hash to big number (from 0 to 2^160 - 1). 4. Translate number to 62-sign numeral system. 5. Each digit is represented as char 0-9, A-Z, a-z. 6. So, we get a password! Length is not more than 28 letters, because 62^28 is greater than 2^160.
    Downloads: 0 This Week
    Last Update:
    See Project