Showing 24 open source projects for "hash"

View related business solutions
  • Dental Patient Communication, Engagement, And Loyalty Icon
    Dental Patient Communication, Engagement, And Loyalty

    For Dental Offices, DSOs, Dentists, Dental Practices

    Our cloud-based, user-friendly system gives you complete control over your patient management and engagement with an all-in-one solution to the everyday needs of your dental organization.
    Learn More
  • From donor engagement to donor retention, DonorPerfect is the complete solution for the tools you need to succeed. Icon
    From donor engagement to donor retention, DonorPerfect is the complete solution for the tools you need to succeed.

    For nonprofits serving their local community to large, international organizations like UNICEF.

    Boost your nonprofit's fundraising initiatives and build valuable donor relationships with DonorPerfect fundraising growth platform. Trusted by more than 50,000 fundraisers, DonorPerfect is packed with powerful features to help nonprofit organizations, regardless of size and mission, effectively manage donor data and raise money for their cause.
    Learn More
  • 1

    hash_val_4_Bloom

    search for hash values used in Bloom filter for QNR membership

    FenderBender -- on MersenneForum.org "Determine Squares" -- came up with using Bloom filter to detect Quadratic non-residues modulo small primes in order to reject what inputs are certainly not square roots. This reduces, by > 99%, the amount of actual square root calc's done and therefore is more efficient and faster. Search fur 32-bit vs 64-bit, hash values that make "perfect" Bloom filter. Variety of (simple) hash functions, requiring 2, 3, 4 or 5 hash values. Hideously vast search space. Non-differentiable, so no gradient descent algo's.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    PetoronHash-System

    PetoronHash-System

    PHASH | post-quantum XOF hashing algorithm | C++20

    PHASH is a self-contained, dependency-free, post-quantum XOF hashing algorithm implemented in modern C++20. This release delivers the first fully stable production implementation of the PetoronHash-System — a 1600-bit sponge-based hash function with domain separation, extendable output, and deterministic behavior. Key Features No external dependencies — pure C++20 implementation. Extendable Output (XOF) — supports arbitrary output length (256–8192+ bits). Post-quantum oriented design — ARX-based sponge resistant to Grover-type attacks. Context and salt separation — unique hashing domains for each use-case. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Jacksum

    Jacksum

    a free cross platform checksum utility, supports 58+ hash algorithms

    ...Jacksum 1.7.0 is a platform independent checksum utility (written entirely in Java) for computing and verifying (integrity check) checksums, CRC and hashes (fingerprints). It supports 58 popular hash algorithms and a lot of unique features.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    RegexToNFA

    Compiles regular expressions into modular NFA

    ...This was originally an extended re-implementation of the "front-end" part in the following paper: https://www.computer.org/csdl/proceedings/reconfig/2008/3474/00/3474a073-abs.html It has since grown to include conversion of a set of NFAs to a DFA; compilation of NFAs to instruction suitable for simulation; and compilation of a DFA to hash-based data structures for a simulator.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Enable remote access to your apps, desktops, and files on any device. Icon
    Enable remote access to your apps, desktops, and files on any device.

    Enable remote and hybrid work for your organization

    Get the most cost-efficient and scalable remote access and application delivery solution. Create secure digital workspaces that users can access with just a web browser.
    Learn More
  • 5

    64-bit prime test

    Test 64-bit integers for pribality. Miller-Rabin, Lucas. BPSW

    ...As values get larger it uses up to two more Miller Rabin rounds, and at the end it uses BPSW (which is one rould of Miller Rabin and then one of Lucas). Compared to other codes that achieve the same I believe that the hash tables used here are compact, and both the programs and the intermediate data used to create them are provided. This may be of interest just to people wanting a C++ implementation of the Lucas test.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Our idea is to deploy a society of computational agents that collaborate in order to achieve the shared goal of decrypting a chunk of ciphertext or recovering a password from an hash by means of a dictionary-based attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    LinAsm

    LinAsm

    Collection of fast and optimized assembly libraries for x86-64 Linux

    ...It implements many common and widely used algorithms for array manipulations: searching, sorting, arithmetic and vector operations, unit conversions; fast mathematical and statistic functions; numbers and time converting algorithms; finite impulse response (FIR) digital filters; spectrum analysis algorithms, Fast Hartley transformation; CPU cache friendly functions and extremely fast abstract data types (ADT) such as hash tables b-trees, and much more. LinAsm libraries are written on FASM assembly language. They are stable and have appropriate benchmarks for many units. All libraries are well documented and grouped by their functionality. To get more information about this library, please visit the official web site: http://linasm.sourceforge.net
    Downloads: 16 This Week
    Last Update:
    See Project
  • 8
    TAG

    TAG

    A tool for metatranscriptome assembly using metagenome graph

    TAG is a tool for metatranscriptome assembly using de Bruijn graph of matched metagenome as the reference. TAG is an application of a reads mapping algorithm that we developed for mapping of short reads onto a de Bruijn graph of assemblies. A hash table of junction k-mers (k-mers spanning branching structures in the de Bruijn graph) is used to facilitate fast mapping of reads to the graph. We have shown that TAG helps to assemble substantially more transcripts from metatranscriptomic datasets that otherwise would have been missed or truncated because of the fragmented nature of the reference metagenome. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Trowel - Sequencing Error Corrector

    Error Correction Module for Illumina Sequencing Reads

    ...Dr. Detlef Weigel's Lab in Max-Planck Institute for Developmental Biology. First of all, you have to install the exact version of boost(>=1.53.0), google sparse hash(>=2.0.2), GCC(>=4.6), autoconf(=2.69), and automake(=1.13).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cloud-Based Software Licensing - Zentitle by Nalpeiron Icon
    Cloud-Based Software Licensing - Zentitle by Nalpeiron

    The #1 Software Licensing Solution. Release new Software License Models fast with no engineering. Increase software sales and drive up revenues.

    1000’s software companies have used Zentitle to launch new software products fast and control their entitlements easily - many going from startup to IPO on our platform. Our software monetization infrastructure allows you to easily build or
    Learn More
  • 10
    CryptoDock

    CryptoDock

    CryptoDock is a tool that hosts various crypto. algorithms.

    CryptoDock is free multi-platform application written in Java that hosts various hash and modern cryptographic algorithms you can use to protect your sensitive data on your computer. Available cryptographic algorithms: 1. NLSE-1 2. One Time Pad 3. AES Available hashing algorithms: 1. MD5 2. SHA-1 3. SHA-256 4. SHA-512 IMPORTANT: In order to run CryptoDock you need to have Java installed on your computer.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    XOR encrypt v2.0

    XOR encrypt v2.0

    Encrypt Your Text documents with XOR encryption

    This software provides an easy graphical way to encrypt your text documents from source code , text files ,scripts even jpeg files .It is a enhanced version of my earlier project https://sourceforge.net/p/xorencrypt which used win32 GUI . This is a demonstration of working of XOR encryption which was used by Germans in World War II (http://en.wikipedia.org/wiki/Lorenz_cipher) . Besides from XOR'ing the message with password after every encryption the key changes pseudorandomly....
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12

    DimerRemover

    Remove adapter dimers from NGS data

    This program can be used to count or remove adapter dimers in fastq files. Using a provided adapter sequence, it generates variations of this sequence and stores them in a hash table. The reads can then be directly matched against the hash. It is far more time efficient than doing alignment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Handwritten Signature SDK

    Java SDK useful to develop handwritten signature verification app

    Handwritten Signature SDK supports: dynamic time wrapping (DTW), extended regression (ER), signature sampling, direction hash and features extraction: see wiki for more info.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    String Hash Calculator

    String Hash Calculator Calculates the MD5,SHA1,MD2 and MD4 Hash

    String Hash Calculator is able to calculates the MD5,SHA1,MD2 and MD4 Hash of a string. The String Hash Calculator does not require any .NET framework or Java it only requires Windows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    FFP (Feature frequency profile) is an alignment free comparison tool for phylogenetic analysis and text comparison. It can be applied to nucleotide sequences, complete genomes, proteomes and even used for text comparison.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Set Theory Relations in Java

    Java classes implementing set theory relation concepts

    ...The classes enable some ordered pairs to be stated, and will deduce all the other related ordered pairs implied by the relation's properties. There are implementations of transitive, reflexive-and-transitive, and symmetric-reflexive-and-transitive (equivalence) relations using hash sets and tree sets. The current version (0.1) has been tested but not substantially used. Feedback from use in the field will be welcomed, as will offers of collaboration to improve the deduction algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A general purpose distributed hash table adapted for sequence analysis. This program searches for all maximal, exact unique n-mers from a given set of genomes. Originally, this program's primary use was to design resequencing microarrays.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    SmutDetect
    Development stop on the standalone application, ported as an autopsy module now: http://www.4ensics.co.uk/smutdetect4autopsy/ SmutDetect is a skin-tone image mining software which scans directories for images containing a specified percentage of skin-tones. It ranks (and filters) these images in various reports. Hash-export can be used to process the results in TSK/autopsy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    SGUtil Time Hash Server
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The EURP OntoLookup is a CREOLE plugin for GATE http://www.gate.ac.uk/ which uses an OWL ontology for lookup. It has a very fast implementation based on a tree of hash maps.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    BruteNet is a system of the distributed brute force and distributed calculations built on user extensions capable to solve a great number of problems related to the partition on a lot of machines.With sample extention you can distribute brute md5-hash
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    MacHash is intended to be a HashCalc clone for Mac OS X. Sporting a neat Aqua interface, it allows you to calculate a variety of popular hash values like MD5 or CRC32 from diffent input sources such as a line of text or a file on disk.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Provides efficient, effective implementations of 32- and 64-bit hash functions based on Rabin fingerprints / irreducible polynomials, in Java. Also provides integration with java.security.MessageDigest API.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Metaphone is a phonetic hash, similar to Soundex but more specific.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next