Search Results for "secure hash algorithm" - Page 4

Showing 124 open source projects for "secure hash algorithm"

View related business solutions
  • Level Up Your Cyber Defense with External Threat Management Icon
    Level Up Your Cyber Defense with External Threat Management

    See every risk before it hits. From exposed data to dark web chatter. All in one unified view.

    Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
    Try for Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    BBQCoin

    BBQCoin

    BBQCoin - The Official Client Development and Client Download site

    WARNING! A so called other BBQCoin sourceforge.net link http://sourceforge.net/projects/bbqcoin-org/ has appeared on the scene claiming to be the only valid or secure download link for the BBQCoin QT wallet. Download at your own risk. BBQCoin is a peer-to-peer Internet currency that enables instant payments to anyone in the world. It is based on the Bitcoin protocol but differs from Bitcoin in that it can be efficiently mined with consumer-grade hardware. BBQCoin provides faster transaction confirmations (2.5 minutes on average) and uses memory-hard, scrypt-based mining proof-of-work algorithm to target the regular computers and GPUs most people already have. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Wave Framework

    Wave Framework

    Open Source API-centric PHP Micro-framework

    Wave is a PHP micro-framework that is built loosely following model-view-control architecture and factory method design pattern. It is made for web services, websites and info-systems and is built to support a native API architecture, caching, user control and smart resource management. Wave is a compact framework that does not include bloated libraries and features and is developed keeping lightweight speed and optimizations in mind. While not necessary for using Wave Framework, it comes by...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    qlsdup

    GUI based lightweight duplicate file finder / remover.

    ...This is basically a reimplementation of dupfinder as: it doesn't compile on my computer, the executable won't work either, the projects seems dead and I didn't wanna work through the original code. So Look'n'Feel should be somewhat the same, though some changes have been made. Algorithm is simple and suitable for large file sets with few differences: basic set of duplicate candidates is determined by file size, then candidates are compared byte-wise. So for files which don't start to differ by growing at the tail it reduces read operations greatly compared to hash-based comparision (i.e. test case: 40GB of files, 16GB RAM, many differences: initial compare (uncached by OS) around 300sec, subsequent compare (relevant file parts cached by OS) ca. 2sec) Note: this program is not related to lsdup
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Ajax Chat

    Chat application using MySQL, PHP and Javascript

    This web application will allow anyone to register using a first and last name and then once logged in it shows the user a list of people that are logged in right now. If they click user 2's name it pops up accept or cancel buttons for user 2. Once they click accept a chat box appears instead of the list of users you can chat with. It only allows you to chat with 1 person at a time. Later we could allow you to chat with more than 1 person in a chat box or more than 1 chat box at a time like...
    Downloads: 20 This Week
    Last Update:
    See Project
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • 5
    SAMSON - Secure Authentication Modules

    SAMSON - Secure Authentication Modules

    Modules for remote attestation.

    The Secure Authentication Modules (SAMSON) are a set of modules designed to work together to provide a mechanism for doing remote authentication of a Linux system. It utilizes the IMA logic (introduced to the Linux kernel in 2.6.30) to perform a SHA-1 measurement of all executables prior to their being placed in execution, either as a program or as a memory mapped file mapped for execution.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    OhCrypt Encryption Tool
    OhCrypt lets you easily encrypt and decrypt files using some of the most popular algorithms, like AES, Blowfish and Serpent. With OhCrypt, you can secure your data with a password-based encryption algorithm through a clean and simple interface. It demonstrates state of the art of cryptology techniques, such as password hashing and salt. Ohcrypt also features self-extractable and self-destructive encrypted files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    sderase

    secure data erase tool for win32

    sderase is SECURE DATA ERASE tool. small,full functional,green,fast,secure and stable. sderase can erase file,folder and disk partition's free space securely. only for windows platform. support fill file's content with zero byte,random data. support US DOD 5220.22-M standard,and Gutmann algorithm. mutithread supported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    AllCheckSumer

    AllCheckSumer

    Calculate and compare files with 3 different file signature algorithms

    AllCheckSumer is a handy tool for computer forensics and is helpful for investigators to search throughout a computer’s file system for a bad hash specified by the investigator. The tool will search throughout a location, specified by the investigator. It can be either an entire file system or a specific folder, and create a hash set with the following file signature algorithms: • MD5 (Message-Digest Algorithm v. 5) • SHA-1 (Secure Hash Algorithm v. 1) • CRC (Cyclic Redundancy Check)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Detailed Presentation of the GROESTL hash function, finalist to the SHA-3 competition organized by the NIST to decide which cryptographic hash algorithm will replace the famous SHA-2.I analyze and present the candidate algorithm I bet on since the beginning of the competition.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 10
    A portable in-place bitwise binary Fredkin trie algorithm which allows for near constant time insertions, deletions, finds, closest fit finds and iteration. Is approx. 50-100% faster than red-black trees and up to 20% faster than O(1) hash tables.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Hash Monster
    A versatile gui and console application capable of generating and comparing hashes using a variety of popular hashing libraries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    FactHash

    Factorial Hashing Function

    ...I hold no guarantee of the security of this algorithm, USE AT YOUR OWN RISK. I have had no 3rd party analysis done on the algorithm to date, but research is welcome, and a challenge is even provided in CHALLENGE.txt.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    I Have The Power

    I Have The Power

    GUI for illustrating the mathematics of large hash algorithms

    A cross platform (Windows\Linux) graphical interface for demonstrating the numerical enormity of large hash algorithms like MD5 (128 bits), SHA1 (160 bits), SHA256 (256 bits) and SHA512 (512 bits). Useful for demonstrations to non-technical audiences such as jury panels, school children, students and so on by converting the scientific notation of the algorithm to "1 in 340 billion....".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    eCryptfs Parser is a GUI for Linux and Windows that recursively parses the headers of every eCryptfs file found in a given directory. It will tell you what encryption algorithm was used, the original filesize, signature used etc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    TinyCrypt is a simple secure program for encrypting files. The core encryption code is only 76 lines of C code, based on the well known ARC4-D(768) algorithm.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16
    TBFAA/encoder
    A program that encrypts multiple files. It uses new encryption algorithms, such as a Three-Block Feistel chiper, ArchFurry's algorithm and a new hash function. Licensed under the ISC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Compiled by Alessandro de Oliveira Faria (a C implementation of MD6). The algorithm is a cryptographic hash developed at MIT by a team led by Ronald Rivest in response to the call for proposals for a SHA-3 cryptographic hash algorithm by the NIST;
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    MUTE is a secure, anonymous, distributed communications framework. Node-to-node connections are encrypted, and messages are routed using an ant-inspired algorithm. The first MUTE-based app supports anonymous file sharing.
    Downloads: 69 This Week
    Last Update:
    See Project
  • 19
    An application presents safe and secure Chat through a certificated point which is the Server. It supports authentication of users using passwords and a simple encryption algorithm to exchange a unique key between the Server and each Client.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Hash Sort is a form distribution sorting algorithm when tested it has an O(N) characteristics in most cases. The trade off is memory for space. Here is a very fast optimized recursive implementation of the hash sorting algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This is a more secure file encryption program which uses SERPENT cipher and WHIRLPOOL+SHA-256 hash functions in key creation and for integrity checking.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    This software is used to delete files securely in the Linux operating system using low level system calls.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Rinecrypt uses the Gladman implentation of the AES algorithm Rijndael and a SHA256 hash among other things, to encrypt/decrypt a file with a user supplied passsword.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Secure P2P Instant Messenger running on .NET Framework 2.0. Uses server to store user information (user name, password, email address, friends list, log in state, IP address) in encrypted form. Uses custom designed symmetric encryption algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    EMURA is a suite of Java applications that allows two users to send encrypted messages back and forth - as a chat. The encryption key is secure and generated using the Diffie-Hellman algorithm. Utilizes GNU-CRYPTO libraries
    Downloads: 0 This Week
    Last Update:
    See Project