Search Results for "secure hash algorithm in opengl"

Showing 9 open source projects for "secure hash algorithm in opengl"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 1
    Custom Erase Algorithm by Mariano Ortu

    Custom Erase Algorithm by Mariano Ortu

    Secure file deletion algorithm with customizable overwrite patterns.

    This project provides a secure file deletion algorithm designed to permanently erase data by overwriting files with customizable patterns. It ensures that deleted files cannot be recovered by standard recovery tools, enhancing data privacy and security. The algorithm supports multiple overwrite passes with user-defined sequences, adapting to different security standards and user needs. It is implemented in C# with a focus on performance and reliability, suitable for integration into...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Largest Generic Hash and HMAC Program

    57 Hash Functions In One Program, plus each with HMAC or KMAC

    FEHASHMAC is the largest collection of publicly known hash algorithms integrated into a command-line utility. FEHASHMAC contains a set of known test vectors and results for each algorithm such that the correct implementation for each hardware platform and compiler version can directly be verified. Currently 57 hash algorithms like sha1 sha224 sha256 sha384 sha512 and variants, sha3 and shake, all SHA3 finalists and blake3, md2 md4 md5 md6, rmd128 rmd160 rmd256 rmd320, whirl gost lash160...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    CerberusCMS5

    CerberusCMS5

    Cerberus Content Management System

    Cerberus Content Management System is a dynamic, secure and infinitely expandable CMS designed after a Unix-Like model. It is a custom written Web Application Framework ( W.A.F. ) with a consistent and custom written Pre-Hyper-Text-Post-Processor Programming Code Framework ( P.C.F. ). This Web Application Software Project' aim is to be the fastest and most secure Web Application Framework, Web Application Programming Code Framework, Text, Voice and Video Communications Platform and Content...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    OpenSSL for Windows

    OpenSSL for Windows

    OpenSSL Portable for Windows 32-bit and Android

    OpenSSL is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library. GOST Engine: GOST 28147-89 - 64-bit block cipher with 256-bit key. GOST R 34.11-94 - Message digest algorithm. 256-bit hash value. GOST R 34.10-2001 - Digital signature algorithm. GOST R 34.10-2012 - Digital signature algorithm. GOST R 34.11-2012 - "Streebog" hash function 256 and 512-bit. ...
    Leader badge
    Downloads: 1,700 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 5
    sjcl

    sjcl

    Stanford Javascript Crypto Library

    The Stanford Javascript Crypto Library is a project by the Stanford Computer Security Lab to build a secure, powerful, fast, small, easy-to-use, cross-browser library for cryptography in Javascript. SJCL is small but powerful. The minified version of the library is under 6.4KB compressed, and yet it posts impressive speed results. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password strengthener; and the CCM and OCB authenticated-encryption modes. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    v1pad

    One-time-pad encryption using a virtual pad

    v1pad is a command-line tool that encrypts and decrypts files using one-time-pad encryption. v1pad uses a virtual pad, meaning that the one-time pad is generated dynamically based on user input instead of being stored in a file. The name v1pad is an abbreviation for Virtual One-Time Pad.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Secure Hash Algorithm variant of the nist maintained Secure Hash Algorithm. this is a 1024 bit digest. Comments suggestions always welcome. Rick Removed old downloads as they are long outdated. The update is the last version I worked on. Algorithm is based on the SHA2 digest. I may work on an updated version for c++11
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    J! Secure Password Hashes
    J! Secure Password Hashes provided an easy access to all Joomla! password hash algorithms and the Drupal 7 SHA-512 hashing algorithm. Compatible: Joomla! 2.5.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    AllCheckSumer

    AllCheckSumer

    Calculate and compare files with 3 different file signature algorithms

    AllCheckSumer is a handy tool for computer forensics and is helpful for investigators to search throughout a computer’s file system for a bad hash specified by the investigator. The tool will search throughout a location, specified by the investigator. It can be either an entire file system or a specific folder, and create a hash set with the following file signature algorithms: • MD5 (Message-Digest Algorithm v. 5) • SHA-1 (Secure Hash Algorithm v. 1) • CRC (Cyclic Redundancy Check)
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Previous
  • You're on page 1
  • Next