Search Results for "encryption algorithm java" - Page 4

Showing 741 open source projects for "encryption algorithm java"

View related business solutions
  • Crowdtesting That Delivers | Testeum Icon
    Crowdtesting That Delivers | Testeum

    Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.

    Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights.
    Click to perfect your product now.
  • Turn Your Content into Interactive Magic - For Free Icon
    Turn Your Content into Interactive Magic - For Free

    From Canva to Slides, Desmos to YouTube, Lumio works with the tech tools you are already using.

    Transform anything you share into an engaging digital experience - for free. Instantly convert your PDFs, slides, and files into dynamic, interactive sessions with built-in collaboration tools, activities, and real-time assessment. From teaching to training to team building, make every presentation unforgettable. Used by millions for education, business, and professional development.
    Start Free Forever
  • 1

    Tree Visualisation with Visual Cues

    Tree Visualisation with Visual Cues

    This project extends a previous work on node link tree visualisation and interaction by providing visual clues on hidden structures. We adopt DOITree from Prefuse package (https://github.com/prefuse/Prefuse), a multi-focal tree layout algorithm, for exploring large hierarchical structures. Related publications: https://www.sciencedirect.com/science/article/pii/S1045926X1630009X https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6902871
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    BD-Func

    Bidirectional Functional Enrichment of Gene Expression Data

    BD-Func is an algorithm to predict activation or inhibition of pathways based upon gene expression patterns. If you use BD-Func, please cite: Warden C, Kanaya N, Chen S, and Yuan Y-C. (2013) BD-Func: A Streamlined Algorithm for Predicting Activation and Inhibition of Pathways. peerJ, 1:e159
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    LEACrypt

    LEACrypt

    TTAK.KO-12.0223 Lightweight Encryption Algorithm Tool

    The Lightweight Encryption Algorithm (also known as LEA) is a 128-bit block cipher developed by South Korea in 2013 to provide confidentiality in high-speed environments such as big data and cloud computing, as well as lightweight environments such as IoT devices and mobile devices. LEA is one of the cryptographic algorithms approved by the Korean Cryptographic Module Validation Program (KCMVP) and is the national standard of Republic of Korea (KS X 3246). LEA is included in the ISO/IEC...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    KeyHolder password manager

    KeyHolder password manager

    Store your passwords in an offline encrypted file!

    Need a JDK to run, download it here: https://www.oracle.com/java/technologies/downloads/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Test your software product anywhere in the world Icon
    Test your software product anywhere in the world

    Get feedback from real people across 190+ countries with the devices, environments, and payment instruments you need for your perfect test.

    Global App Testing is a managed pool of freelancers used by Google, Meta, Microsoft, and other world-beating software companies.
    Try us today.
  • 5
    Client-side Encryption Amazon DynamoDB

    Client-side Encryption Amazon DynamoDB

    Amazon DynamoDB Encryption Client for Java

    The Amazon DynamoDB Client-side Encryption in Java supports encryption and signing of your data when stored in Amazon DynamoDB. A typical use of this library is when you are using DynamoDBMapper, where transparent protection of all objects serialized through the mapper can be enabled via configuring an AttributeEncryptor. Use SaveBehavior.PUT or SaveBehavior.CLOBBER with AttributeEncryptor. If you do not do so you risk corrupting your signatures and encrypted data. When PUT or CLOBBER...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    AcoPath for Java

    Ant Colony Optimization algorithm for the shortest path problem.

    The shortest path problem is solved by many methods. Heuristics offer lower complexity in expense of accuracy. There are many use cases where the lower accuracy is acceptable in return of lower consumption of computing resources. The basic idea of the Ant System is that virtual ants are exploited for finding paths with a specific property, e.g., short distance between physical nodes, in the same way nature guides physical ants.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Worderize Lite

    Worderize Lite

    Worderize is designed to make the language learning more effective.

    Worderize Lite is an open-source software that is designed to make the language learning process more effective. New features in V2.0: German and French localization; You can now add definition to words; "Edit" button for words and their definitions; DES + AES encryption. New features in V2.1: Support for Hebrew language. For more information please visit: https://github.com/Northstrix/Worderize Worderize Lite requires java to be installed on your computer. You can download...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    File-Splitter

    File-Splitter

    A simple tool for split, zip, and encrypt files

    Need a JDK to run, download it here: https://www.oracle.com/java/technologies/downloads/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    GMSM Toolkit ☭

    GMSM Toolkit ☭

    Cross-platform GMSM Security Suite written in Go

    GMSM Toolkit v1.2.3 ☭ Multi purpose cross-platform cryptography tool for asymmetric/symmetric encryption, cipher-based message authentication code (CMAC), recursive hash digest, hash-based message authentication code (HMAC) and PBKDF2 function. SM2/SM3/SM4 Chinese National Standard Algoritms: • GM/T 0003-2012 - SM2 Public key algorithm 256-bit. • GM/T 0004-2012 - SM3 Message digest algorithm. 256-bit hash value. • GM/T 0002-2012 - SM4 Symmetric block cipher with 128-bit key...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    JQM Java Quine McCluskey

    JQM Java Quine McCluskey

    JQM - Java Quine McCluskey for minimization of Boolean functions.

    Java Quine McCluskey implements the Quine McCluskey algorithm with Petrick’s Method (or the method of prime implicants) for minimization of Boolean functions. This software can be used both for learning and solving real problems. As a learning/teaching tool, it presents not only the results but also how the problem was solved as well as how to use Karnaugh Maps to solve the problem. Up to sixteen functions of sixteen variables can be minimized. A graphical interface is provided for entering...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11

    NtrUtil

    A command line interface for encryption and decryption using the NTRU

    A command line interface for encryption and decryption using the NTRU cryptography algorithm. "NTRU is a public key cryptosystem that is considered unbreakable even with quantum computers. Commonly used cryptosystems like RSA or ECC, on the other hand, will be broken if and when quantum computers become available."-NTRU
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    SM3SUM(2)

    SM3SUM(2)

    Command-line GM/T 0004-2012 SM3 Recursive Hashsum Tool

    This new module can be used to compute SM3 message digest of files or memory blocks according to the specification GM/T 004-2012 Cryptographic Hash Algorithm SM3, published by State Encryption Management Bureau, China. This project is licensed under the ISC License. Copyright © 2020-2022 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/sm3sum Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    TengineKit

    TengineKit

    TengineKit - Free, Fast, Easy, Real-Time Face Detection

    Free, Fast, Easy, Real-Time Face Detection & Face Landmarks & Face Attributes & Hand Detection & Hand Landmarks & Body Detection & Body Landmarks & Iris Landmarks & Yolov5 SDK On Mobile. TengineKit is an easy-to-integrate AI algorithm SDK. At present, it can run on various mobile phones at very low latency. We will continue to update this project for better results and better performance!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    JQuickBase

    JQuickBase

    elementary database files for Java, B+ tree index files, ISAM

    Java API to realize quick ISAM (Index Sequential Access Method) functionality for application in the file system. Includes scalable database files w/ space recovery and variable record length, scalable B+Tree index files. Supports file backup and restore. Two package types: one with and one without strong file encryption using Twofish algorithm and state-of-the-art encryption technology.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Graylog Cookbook

    Graylog Cookbook

    Chef recipes to deploy Graylog

    This Chef cookbook installs and configures the Graylog log management system. Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place. Search terabytes of data in milliseconds so you can ask more questions and get more answers. Save and share searches to save time and share expertise. Combine a variety of data widgets to customize dashboards to exactly...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    LiteMessage

    A lightweight, peer-to-peer messaging program.

    A lightweight peer-to-peer messaging program that runs in the console. It also has a GUI version. It is currently very early in development. It is implemented in Java, so it is cross-platform. Currently developed using Java 8 (aka 1.8) It is distributed under the 3-clause BSD license. Planned features in the future include message encryption and file transfers. The most up-up-to-date source can be found on GitHub: https://github.com/cguy777/LiteMessage The MTools library can...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Stegofierfx

    Stegofierfx

    It is a simple and user friendly application to hide messages in image

    Stegofier is a simple and user friendly interface to hide and retrieve message inside any Image file (Specifically for Portable Network Graphics (.PNG) files) with a support for range of Devices and Operating Systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Jasmine

    Jasmine

    Super fast Java aexpression and algorithm evaluator

    V1.0.1 fully compatible with PS2 and 3. Jasmine uses the ASM byte code manipulation library (http://asm.ow2.org/) to create Java byte code to evaluate numerical expressions and algorithms. Evaluation of compiled expressions is very fast, in most cases it is faster than the equivalent byte code produced by the Java compiler (javac).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Learn Julia the Hard Way

    Learn Julia the Hard Way

    Learn Julia the hard way

    ... be hard-pressed to find tasks it's completely unsuitable for (although that does not mean it's the best or easiest choice for any of them). Julia was developed with the occasional reference to R, and with an avowed intent to improve upon R's clunkiness. R is a great language, but relatively slow, to the point that most people use it to rapidly prototype, and then implement the algorithm for production in Python or Java. Julia seeks to be as approachable as R but without the speed penalty.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20

    S-DES Crypto App

    Encryption/Decryption demonstration app using the S-DES algorithm

    Encryption/Decryption demonstration app using the S-DES algorithm. Use the Java runtime environment 11 for execution. The GUI pops up that allows entering a 10-bit encryption/decryption key in binary (0, 1 digits) and the plaintext/ciphertext in the same form (8-bit). Executing the algorithm, decription of the encoding/decoding functionality is provided in the three main text boxes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    KISA Toolkit

    KISA Toolkit

    Korea Internet & Security Agency's Cipher Suite written in Go

    Golang implementation of cryptographic algorithms designed by Republic of Korea. The Korea Internet & Security Agency (KISA) is distributing source codes that you can easily use. South Korean National Standard Algorithms: • LSH Message digest algorithm. 256/512-bit hash value. • ARIA 128-bit Block cipher with 128/192/256-bit keys. • LEA 128-bit Block cipher with 128/192/256-bit keys. • SEED 128-bit Block cipher with 128/256-bit keys. • HIGHT 64-bit Block cipher with 128bit key...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Abdal AES Encryption

    Abdal AES Encryption

    AES Message Encryption Tool

    Abdal AES Encryption is a security tool for encrypting messages developed by the Abdal team. This tool uses AES encryption and has high power. AES stands for Advanced Encryption Standard, which was developed in 2001 by the US National Institute of Technology and Standards. The advanced encryption standard is accepted by the US government and is now used worldwide. This encryption algorithm replaces the Data Encryption Standard (DES) published in 1977.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Drive Badger

    Drive Badger

    Open source platform for covert data exfiltration operations.

    Drive Badger is a software tool for data exfiltration – which means, for copying data from the computer to external USB drive. Unlike many other tools from IT security area, it's not a Proof-of-Concept kind of tool, bringing some groundbreaking techniques. Everything, what Drive Badger does, can be as well run manually, step by step. Instead, what Drive Badger really does, is doing it all better, by putting the maximum focus on:
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    BifurcumLib

    BifurcumLib

    A library for running through a directional graph.

    This is the library for the project Bifurcum. It does all the work. It has a simple algorithm (Deep First Search with modifications) and allows sorting children before traversing. This library sums up the authors 4-years experience when programming a commercial tool for graph traversing (which used a much more advanced algorithm) and coaching its users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Bifurcum

    Bifurcum

    Software to run through a directional graph.

    This software runs through a directional graph and writes the paths it found as test specifications. It has a simple algorithm (Deep First Search with modifications) and allows sorting children before traversing. This application sums up the authors 4-years experience when programming a commercial tool for graph traversing (which used a much more advanced algorithm) and coaching its users. Technically it is a front end for the library Bifurcumlib.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.