Showing 124 open source projects for "secure hash algorithm"

View related business solutions
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered appsβ€”without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • 1
    Custom Erase Algorithm by Mariano Ortu

    Custom Erase Algorithm by Mariano Ortu

    Secure file deletion algorithm with customizable overwrite patterns.

    This project provides a secure file deletion algorithm designed to permanently erase data by overwriting files with customizable patterns. It ensures that deleted files cannot be recovered by standard recovery tools, enhancing data privacy and security. The algorithm supports multiple overwrite passes with user-defined sequences, adapting to different security standards and user needs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    xxHash

    xxHash

    Extremely fast non-cryptographic hash algorithm

    xxHash is an extremely fast non-cryptographic hash algorithm, working at RAM speed limit. It is proposed in four flavors (XXH32, XXH64, XXH3_64bits and XXH3_128bits). The latest variant, XXH3, offers improved performance across the board, especially on small data. It successfully completes the SMHasher test suite which evaluates collision, dispersion and randomness qualities of hash functions.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Node Argon2

    Node Argon2

    Node.js bindings for Argon2 hashing algorithm

    A Node.js library for hashing passwords securely using the Argon2 key derivation function, a modern cryptographic algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    The XRP Ledger

    The XRP Ledger

    A decentralized cryptographic ledger

    The XRP Ledger is an open source, decentralized and permissionless blockchain technology powered by a network of peer-to-peer servers. It allows for really fast settlement of transactions- within 3-5 seconds- without a central intermediary and in a secure distributed database. The native digital asset on the XRP Ledger is the XRP. A public,counterparty-free asset, it is designed to bridge many different currencies being used worldwide, and is available for anyone to access and trade on...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do bestβ€”building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    nkn

    nkn

    Official Go implementation of NKN full node

    NKN (New Kind of Network) is a blockchain-based network infrastructure that utilizes a novel consensus mechanism to facilitate decentralized data transmission. By incentivizing network participants with tokens, NKN aims to create a more open, efficient, and secure internet. Its architecture supports a wide range of applications, from messaging to content delivery.​
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    GmSSL

    GmSSL

    Password toolbox that supports national secret

    ...National secret algorithm and SSL protocol are embedded in existing projects. The default CMake build system can be easily used with default compilation tools such as Visual Studio and Android NDK. Developers can also manually write Makefiles to compile in special environments, tailoring.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 7

    Largest Generic Hash and HMAC Program

    57 Hash Functions In One Program, plus each with HMAC or KMAC

    FEHASHMAC is the largest collection of publicly known hash algorithms integrated into a command-line utility. FEHASHMAC contains a set of known test vectors and results for each algorithm such that the correct implementation for each hardware platform and compiler version can directly be verified. Currently 57 hash algorithms like sha1 sha224 sha256 sha384 sha512 and variants, sha3 and shake, all SHA3 finalists and blake3, md2 md4 md5 md6, rmd128 rmd160 rmd256 rmd320, whirl gost lash160 lash256 lash384 lash512 tiger2 and RFC 2104 HMAC and KMAC support are included, plus SHA3 extensions kmac128, kmac256, kmacxof128, kmacxof256 for message.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Appfl

    Appfl

    Advanced Privacy-Preserving Federated Learning framework

    APPFL (Advanced Privacy-Preserving Federated Learning) is a Python framework enabling researchers to easily build and benchmark privacy-aware federated learning solutions. It supports flexible algorithm development, differential privacy, secure communications, and runs efficiently on HPC and multi-GPU setups.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    etcd

    etcd

    Distributed reliable key-value store for the most critical data

    A distributed, reliable key-value store for the most critical data of a distributed system. etcd is a strongly consistent, distributed key-value store that provides a reliable way to store data that needs to be accessed by a distributed system or cluster of machines. It gracefully handles leader elections during network partitions and can tolerate machine failure, even in the leader node. etcd is a consistent distributed key-value store. Mainly used as a separate coordination service, in...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place. Icon
    Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place.

    For healthcare Providers and Facilities

    Incredable streamlines and simplifies the complex process of medical credentialing for hospitals and medical facilities, helping you save valuable time, reduce costs, and minimize risks. With Incredable, you can effortlessly manage all your healthcare providers and their credentials within a single, unified platform. Our state-of-the-art technology ensures top-notch data security, giving you peace of mind.
    Learn More
  • 10
    Go Recipes

    Go Recipes

    Collection of handy tools for Go projects

    Visualize the distribution of code coverage in your project. This helps to identify code areas with high and low coverage. Useful when you have a large project with lots of files and packages. This 2D image-hash of your project should be more representative than a single number. For each module, the node representing the greatest version (i.e., the version chosen by Go's minimal version selection algorithm) is colored green. Other nodes, which aren't in the final build list, are colored grey β€” by the official Go team. Use to find unexpected dependencies or visualize the project. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Comeonin

    Comeonin

    Password hashing specification for the Elixir programming language

    Comeonin is the long-standing password-security library for Elixir that standardizes secure hashing and verification practices in Phoenix and Plug applications. It provides a uniform interface for modern algorithms such as Argon2, Bcrypt, and PBKDF2 (implemented in companion packages), along with guidance for salts, cost factors, and timing-safe comparisons. The library’s helpers make it straightforward to add registration and login flows that resist brute-force and side-channel attacks....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Jupyter Enterprise Gateway

    Jupyter Enterprise Gateway

    Enables Jupyter Notebooks to share resources across clusters

    Jupyter Enterprise Gateway is a headless web server with a pluggable framework for anyone supporting multiple notebook users in a managed-cluster environment. Some of the core functionality it provides is better optimization of compute resources, improved multi-user support, and more granular security for your Jupyter notebook environment - making it suitable for enterprise, scientific, and academic implementations. From a technical perspective, Jupyter Enterprise Gateway is a web server...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    htmly

    htmly

    Simple and fast databaseless PHP blogging platform, and Flat-File CMS

    HTMLy is an open source databaseless PHP blogging platform. A flat-file CMS that allows you to create a fast, secure, and powerful website or blog in seconds. HTMLy uses a unique algorithm to find or list any content based on date, type, category, tag, or author, and it's performance remains fast even if we have tens of thousands of posts and hundreds of tags. As a flat-file CMS, HTMLy is designed to run smoothly despite using minimal server specs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Nano ID

    Nano ID

    A secure, URL-friendly, unique string ID generator for JavaScript

    Nano ID is a library for generating random IDs. Likewise UUID, there is a probability of duplicate IDs. However, this probability is extremely small. Meanwhile, a lot of projects generate IDs in small numbers. For those projects, the ID length could be reduced without risk. This calculator aims to help you realize the extent to which the ID length can be reduced. Instead of using the unsafe Math.random(), Nano ID uses the crypto module in Node.js and the Web Crypto API in browsers. These...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    AWS Encryption SDK for Java
    The AWS Encryption SDK is a client-side encryption library designed to make it easy for everyone to encrypt and decrypt data using industry standards and best practices. It enables you to focus on the core functionality of your application, rather than on how to best encrypt and decrypt your data. The AWS Encryption SDK is provided free of charge under the Apache 2.0 license. With the AWS Encryption SDK, you define a master key provider (Java and Python) or a keyring (C, C#/.NET, and...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    KeePass

    KeePass

    A lightweight and easy-to-use password manager

    KeePass Password Safe is a free, open source, lightweight, and easy-to-use password manager for Windows, Linux and Mac OS X, with ports for Android, iPhone/iPad and other mobile devices. With so many passwords to remember and the need to vary passwords to protect your valuable data, it’s nice to have KeePass to manage your passwords in a secure way. KeePass puts all your passwords in a highly encrypted database and locks them with one master key or a key file. As a result, you only have to...
    Leader badge
    Downloads: 314,097 This Week
    Last Update:
    See Project
  • 17
    PeaZip

    PeaZip

    Free Zip software and Rar extractor

    PeaZip is a free archiver tool. The application provides an unified, natively portable, cross-platform file manager and archive manager GUI for many Open Source technologies like 7-Zip, FreeArc, PAQ, UPX. Create: 7Z, ARC, Brotl, BZip, GZip, PEA, TAR, WIM, XZ, ZPAQ, ZIP, Zstandard files and more Open and extract 200+ file types: ACE, CAB, DEB, ISO, RAR, ZIPX and more Features of PeaZip includes extract, create and convert multiple archives at once, create self-extracting archives...
    Leader badge
    Downloads: 1,606 This Week
    Last Update:
    See Project
  • 18
    seekthis
    πŸ” SeekThis – File Encryption & Decryption Tool (AES) Secure your important files with SeekThis, a lightweight and efficient tool to encrypt and decrypt files using the AES (Advanced Encryption Standard) algorithm. With SeekThis, you can: βœ… Hide important files using your own key βœ… Protect data privacy quickly and easily βœ… Decrypt files only if you have the correct key βœ… Free and open-source!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    BeeBEEP (Free Office Messenger)

    BeeBEEP (Free Office Messenger)

    You can message and share files inside your intranet without a server.

    BeeBEEP is a secure (encryption based on Rijndael Algorithm, AES) peer to peer office messenger. You can talk and send files with all your colleagues inside a local area network such of an office, home or internet cafe without a server. BeeBEEP works also with VPNs. This serverless application is indispensable in all those places where privacy and security an essential requirement.
    Leader badge
    Downloads: 2,043 This Week
    Last Update:
    See Project
  • 20
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    Naeon is a data encryption and sharding method designed to secure data in potentially untrusted off-site storage locations. It uses AES-256 encryption with a randomly generated passphrase, followed by obfuscation techniques to make the encrypted file unidentifiable. The data is then sharded into one private chunk containing the encryption key and part of the data, and multiple public chunks. Each chunk is renamed using its SHA-512 hash, and all chunks are timestamped equally. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    JVerifier An hash code verifier JVerifier is a command line application that verify checksums from a GNU-style file. Source code available on https://github.com/davidesestiliwork/JVerifier2 Usage: param 1: file name, param 2: algorithm, param 3: baseDir Example: java -jar JVerifier2.jar SHA1SUMS SHA-1 /home/davide Note: this program requires GnuPG to work properly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    HashSum is a .NET port from GNU's md5sum and sha1sum. It supports: hash algorithm selection between MD5 and SHA1 (more could be added later) and compatibility between HashSum and GNU's checksum file format
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    PetoronHash-System

    PetoronHash-System

    PHASH | post-quantum XOF hashing algorithm | C++20

    PHASH is a self-contained, dependency-free, post-quantum XOF hashing algorithm implemented in modern C++20. This release delivers the first fully stable production implementation of the PetoronHash-System β€” a 1600-bit sponge-based hash function with domain separation, extendable output, and deterministic behavior. Key Features No external dependencies β€” pure C++20 implementation. Extendable Output (XOF) β€” supports arbitrary output length (256–8192+ bits).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Open Stienolism Project

    Open Stienolism Project

    Open Stienolism Federated Networking + Resources + Peering Systematic

    ...We are already on Systems, Underlayer, Sublayer + Bells!! Including Signer (Cryptographic) Improvements as well as the new Manette.* PMCROE which TLA as an cipher algorithm stands for: Polyphasic Mutimultifacet Cross Rail Organic Encryption --> which is in effect with the ChronolabsCoop-Stiens.* for all old fashion Secure Functions, we offer a range of tools and abstraction executables to assist with stien, you can on out: https://stien.sourceforge.io --> mount stien files directly over the timing bell, which the signer with an online signal to sourceforge.net can also do this; when we make this all available!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    PWSLIB3

    PWSLIB3

    Password Safe encrypted databases, Java library

    Java module to create, read and write Password Safe V3 encrypted databases. The package is a mature offspring from project JPasswords and can be used with Java 1.8. There is an API document available.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next