Showing 19 open source projects for "caesar-lisflood"

View related business solutions
  • Get Advanced Threat Protection for Your Azure Workloads Icon
    Get Advanced Threat Protection for Your Azure Workloads

    FortiGate NGFW on Azure Enables You to Protect Your Workloads Beyond Basic Azure Security Services

    FortiGate NGFW identifies and stops advanced threats with powerful application control, malware protection, web filtering, antivirus, and IPS technology. As the attack surface expands, FortiGate provides integrated and automated protection against emerging and sophisticated threats while securing hybrid or multi-cloud environments. Deploy today in Azure Marketplace.
  • Manage your IT department more effectively Icon
    Manage your IT department more effectively

    Streamline your business from end to end with ConnectWise PSA

    ConnectWise PSA (formerly Manage) allows you to stop working in separate systems, and helps you build a more profitable business. No more duplicate data entries, inefficient employees, manual invoices, and the inability to accurately track client service issues. Get a behind the scenes look into the award-winning PSA that automates processes for each area of business: sales, help desk, support, finance, and HR.
  • 1
    Caesar.jl

    Caesar.jl

    Robust robotic localization and mapping

    A multimodal/non-Gaussian robotic toolkit for localization and mapping -- reducing the barrier of entry for sensor/data fusion tasks, including Simultaneous Localization and Mapping (SLAM). Code changes are currently tracked via Github's integrated Milestone/Issues/PR system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    CTFcrackTools

    CTFcrackTools

    China's first CTFTools framework

    The first CTF tool framework in China. China's first CTFTools framework designed to help CTFer quickly overcome the CTF problem. Use kotlin and java mixed development. This is probably the first tool framework applied to CTF in China. Built-in current mainstream password, includes but is not limited to Virginia password, Caesar password, fence password. Users can write plugs independently, but only support Python to write plugs. The writing method is also extremely simple. (Due to Jython's own...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Ascon

    Ascon

    Command-line Ascon v1.2 Encryption Tool written in Go

    Ascon is a new family of authenticated encryption algorithms, submitted to the CAESAR competition for authenticated ciphers. The Ascon family was designed to be lightweight and easy to implement, even with added countermeasures against side-channel attacks. This project is licensed under the ISC License. Copyright © 2020-2022 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/ascon Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Grain128AEAD

    Grain128AEAD

    A lightweight AEAD stream cipher submitted to the CAESAR competition

    Grain is a stream cipher submitted to eSTREAM in 2004 by Martin Hell, Thomas Johansson and Willi Meier. It has been selected for the final eSTREAM portfolio for Profile 2 by the eSTREAM project. Grain is designed primarily for restricted hardware environments. It accepts an 80-bit key and a 64-bit IV. The specifications do not recommended a maximum length of output per (key, iv) pair. A number of potential weaknesses in the cipher have been identified and corrected in Grain 128a which is now...
    Downloads: 0 This Week
    Last Update:
    See Project
  • The Secure Workspace for Remote Work Icon
    The Secure Workspace for Remote Work

    Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.

    Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
  • 5
    Jack LIRE (Linked Record)

    Jack LIRE (Linked Record)

    Quantum universal object system with referencing and genetics

    Jack LIRE (Linked Record) is a quantum database-backed life-long text record diary with referencing (linking) between records, and a data library for life-long keeping of files such as documents, photographs, music and more. The diary records are fully searchable. Files can be mentioned in diary records to preserve memories, document knowledge and ideas, and more. Massive numbers of diary records and files can be permanently kept. A database located on one computer can be accessed from...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    TeaCrypt-lib

    TeaCrypt-lib

    Tiaray's Exposed Architecture library

    Exposed architecture for integrity and confidentiality. Librairie en matière première pour la cybersécurité.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    approach to encryption and decryption involves two strings. The first is an encryption / decryption string which we will allow to be up to 128 lower case alphabetical characters in length. The second string is a line of text from a file that is to be encrypted or decrypted. the basic strategy for encrypting data is based on mapping alphabetical characters to specific values, then doing some simple mathematical operations to create a new value.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    n-chinese-remainders

    n-chinese-remainders

    chinese remainder theorem - progressive solving, n-soln, extras

    ... sawtooth CR waves and visible soln align1: solves i m2 == j m2 + b -> {i,j,dist} (like PowerMod->i but b is any and gcd(m1,m2) not req.) other funs: Euclidians, showFactors, changeBaseArr, caesar, rsa, inverseMod, IntToModTups (large number math for PC's) crfindnSolnAfterxInEqm (solve saw wave LL,RL,LR,... intersects) congruence, plots, y-shifted triangular wave solve, testing (for historic reasons files are also in https://sourceforge.net/projects/periodictablemm/)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    CaesarIA (openCaesar3)

    CaesarIA (openCaesar3)

    Remake of the classic Caesar III game

    CaesarIA is an open source remake of Caesar III game released by Impressions Games in 1998, it aims to expand the possibilities of the classical city-building simulators and to add new features showing the city life. Now the game work with Windows, Linux, Mac, Haiku and Android. The original Caesar3 game is needed to play openCaesar3. We start crowdfunding campaign for renew graphic set at www.igg.me/at/caesaria-game. Help us set new stage in good old Caesar.
    Downloads: 20 This Week
    Last Update:
    See Project
  • Omnichannel contact center platform for enterprises. Icon
    Omnichannel contact center platform for enterprises.

    For Call centers or BPOs with a very high volume of calls

    Deliver a personalized customer experience with every interaction, across every channel, with uContact, net2phone’s cloud contact center solution.
  • 10

    Caesar Cipher v1

    Encrypt your messages with Caesar Cipher algorithm.

    Encrypt your messages with Caesar Cipher algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    CryptoDoctor

    Easy encryption and decryption of Texts

    CryptoDoctor is a simple but powerful tool to encrypt and decrypt texts. It is currently available in german language. Moved to GitHub.com: http://saladan.github.io/CryptoDoctor
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that each...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    JCryptor

    JCryptor is an encrypting tool based on the Caesar-cipher.

    JCryptor uses the Caesar-cipher to encrypt keystrokes on-the-fly. It can also be used to decrypt an encrypted text easily. Caesar-cipher is a simple encryption algorithm, developed by Julius Caesar, to encrypt his correspondence with Cicero in the ancient world. Therefore it uses a simple character substitution method to replace a given character by another. A keyshift of thirteen is called ROT13. ROT13 can be decrypted by encrypting it again with ROT13. Even today this simple method is used...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    CaesarCipher is a simple tool which helps you de/encrypt texts with the caesar cipher. This tool should not be used to encrypt sensitive data like passwords or personal information.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 15
    HcryptoJ (Historical cryptology in Java) is a Java based programming library for implementing and analyzing historical ciphers. HcryptoJ is designed to support research and teaching in historical cryptography and computer science. Licensed under GPL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This tool is intended to assist individuals interested in learning cryptography. Cryptographic algorithms included are RSA, Vignére cipher, Caesar cipher, Ubchi, with others to come. Code has been written in python and commented for learning ease.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Verto is a compiler that uses a top-down recursive descent parser implemented in Java for educational purposes. It translates Verto language (a subset of the C language) into Caesar machine language. Verto is the Latin word for interpret.
    Leader badge
    Downloads: 41 This Week
    Last Update:
    See Project
  • 18
    SLEncrypt is a python module for encryption with 11 ciphers at the moment, including ADFGVX, Autokey, Caesar/ROT13, Vigenere, XOR and a lot more. It contains functions allowing you to easily encrypt/decrypt files. The code is about 95% PEP 8 compilant.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    alph implements and analyses historical and traditional c(ai)phers providing a pipe interface in order to encrypt and decrypt block text. The program can be conjuncted with pipes reulting in transparent en-decrypt: Atbash,Caesar,Vigenere,Playfair,Vernam..
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next