Search Results for "encryption algorithm java" - Page 25

Showing 741 open source projects for "encryption algorithm java"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 1
    A multithreaded GUI based encryption software that can encrypt any file on any platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Luky Library is a set of java classes which abstract complex operations. It comprises of classes for networking, event handling, encryption, database handling, snmp monitoring, queues, semaphores, parsers, XML handlers and much more
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    The Eclipse XML-Security Plug-In allows you to experiment with the W3C recommendations on digital signatures and encryption and to learn all about their background. Arbitrary XML documents can be canonicalized, signed, verified and en- or decrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    This project intends to create an indexing search engine, for knowledge management. The primary object is to apply an information retrieval core. And implement a knowledge data discovery theory such as data mining algorithm, text mining.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    The Moonbounce API is a set of high level objects that encapsulate pieces of the Bouncycastle lightweight crypto API. Moonbounce significantly simplifies RSA key generation, signing, encryption/decryption and verification of both byte arrays and files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A Java implementation of the NEAT algorithm as created by Kenneth O Stanley. Also provides a toolkit for further experiments to be created and can provide both local and distributed learning environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Galapagos is a Genetic Algorithm framework written in Java 5 with the intended audience of undergraduates in an Artificial Intelligence class. The goal of Galapagos is usability: a competent student should be able to learn this library in an afternoon.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    StrMatch is a simple java program, created for educational purposes, that allows user to test a great part of string matching algorithms. An intuitive user interface shows each algorithm step accurately...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Turn Your Content into Interactive Magic - For Free Icon
    Turn Your Content into Interactive Magic - For Free

    From Canva to Slides, Desmos to YouTube, Lumio works with the tech tools you are already using.

    Transform anything you share into an engaging digital experience - for free. Instantly convert your PDFs, slides, and files into dynamic, interactive sessions with built-in collaboration tools, activities, and real-time assessment. From teaching to training to team building, make every presentation unforgettable. Used by millions for education, business, and professional development.
    Start Free Forever
  • 10
    YACJ is yet another Jabber client, the intended main feature is to support encryption and digital signature being a secure client. It can also be used as a normal and easy-to-use Jabber client.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    QMCMinimizer is a java-swing based aplication. It's designed with the purpose to be used as a tool on university degrees such as computer science, for teaching the process of boolean function simplification, through the Quine-McCluskey algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    musicomp is a program which most important element is an evolutionary algorithm which uses data mining methods as a fitness function to generate monophone melodies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    jGABL (the Java Graph Algorithm Base Library) is a java library for the implementation of graph algorithms. It covers a hierarchy of graph concepts, various graph implementations, and algorithm animation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This project provides a JAVA library and a graphical user interface which implement the "FastICA" algorithm based on the paper "Fast and Robust Fixed-Point Algorithms for Independent Component Analysis (ICA)" by Aapo Hyvärinen.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This is an attempt to make a X vs. O game, without using a back-tracing, or any other time wasteful algorithm. Instead, an arrays of bonuses are used. Bonuses are given for each move, after which empty fields are sorted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Open source DRM for MPEG-4 and MPEG-2 adhering to ISO/MPEG IPMP open standards (MPEG IPMP Hooks and IPMP-X), ISMAcryp and OMA DRM 2 specs. Includes CA, PKI, DOI mgmt, ISMA streaming, license server, encoding/encryption, player, plugin architecture, etc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ThunderChat is a platform independent, multilingual chat software that uses strong encryption and offers a plugin system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Aimed at being the all-in-one note taking software written in Java. Featuring multiple notebooks containing unlimited pages and notes within. Rich-text, html, and screenshots. Optional password protection and encryption options.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    This project aims at developing a comprehesive Java library for Encryption as well as performing Linear and Differential Cryptanalysis of SPN [ Substitution Permutation Networks] and DES algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Portable and simple program for text and files encryption (Symmetric, Asymmetric and Steganography)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    PRE4J (Partial RDF Encryption API for Jena) is a lightweight API for encrypting selected RDF graph elements. PRE4J provides cryptographic extensions to the Jena Semantic Web Framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    In imitative learning, an agent will attempt to match what is observed to their memory. By visualizing the incorrectly matches "scenes", this project will allow algorithm developers to gain a better understanding of what causes their algorithms to fail.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Flash/PHP adaptation of the XTEA encryption algorithm. Allows encryption/decryption of sensitive data using 128-bit key. May be used for network data (HTTP) or offline for implementations like secure CD-ROM projects.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    RC4.NET is a library that adds support for encrypting/decrypting using the symmetric RC4 algorithm in the .NET environment. The library is written in C# language, and performs equally well on both the Microsoft CLR and Mono platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Neural networks evolution (genetic algorithm) written in Java. Now neural networks try to playing Go, Tic-Tac-Toe.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.