Showing 399 open source projects for "encryption algorithm java"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    BlowfishVHDL - free fully synthesizable Blowfish encryption algorithm hardware implementation.
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Pseudo Random Number Generator (PRNG) frontend using libtomcrypt. It simply writes pseudorandom data (using sober-128, fortuna, yarrow or rc4 algorithm) on standard output. The output may be encoded to base64, base85 or hex or just left binary.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Figaro's Password Manager (FPM) is a GNOME application that allows you to securely store & categorize your passwords, which are encrypted using the blowfish algorithm. It can launch applications using the host names, user names, and passwords you supply.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    This is a java based encryption program that can encrypt any file you point it to.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 5
    With Tiger Envelopes you can stop snoops from reading your email. Same email client. No extra steps. One click to install on Windows and Linux. Configures Outlook, Thunderbird, and KMail. Supports GPG, PGP, Bouncy Castle encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    epacrypt is a tool to encrypt and decrypt plaintext and binary data using different encryption algorithms which can be chosen from a list.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Szyfrator is a GUI application for Windows XP/Vista/7. It encrypts and decrypts text messages using the public RSA algorithm. It generates two 256 bit keys: public and private and was designed to be very easy to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Type no more passwords. Use PhoneID to store passwords on your mobile phone, and automatically send them to Windows login, browsers, FTP/SSH clients, OTP, file encryption, PKI, etc. Uses BlueCove. See Wiki page for more details.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    JSerpent is an easy to use Java implementation of the powerful Serpent cryptography algorithm. It can be easily implemented into any project, and is complete with ECB, padding, and a simple API.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    JFish is a simple Java implementation of the popular Twofish cryptography algorithm. It allows any application to easily implement powerful encryption, using a single small library and minimal code changes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Bork is a very small, cross-platform file encryption utility. It is written in Java and designed to be included along with the files it encrypts for long-term storage (eg on CD-R). Its minimal external dependencies make it fairly futureproof.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    JRijndael is a 100% pure Java implementation of the popular Rijndael (aka AES) cryptography algorithm. It's designed to be implemented as easily as possible and features ECB, padding, and a simple API.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Secret Sharp is a wizard based GUI for the Shamir Secret Sharing Algorithm provided by the crypto++ API. Secret Sharp replicates the functionality that 'ssss' provides on unix.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    An Open-Source GUI for encryption of several filetypes using various algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    stores a free text field strongly encrypted on a cell-phone or PDA using AES encryption with 256 bit -- can be used for storing passwords, pins and other sensitive data
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    Encryption plugin for Alfresco. Enables the user to crypt and decrypt (it handles the 'pkcs5' MIME-type). This is a component of the IDX-eDOC project (OpenTrust suite), contributed by IDEALX
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    wlfXchanger is a point-to-point communication software which enable developers to cooperate in a secure way, using an asymmetric encryption system (Public Key Cryptography).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    It is a fine tool to encrypt your data.It uses a dinamic algorithm and a nice interface.It`s easy to use and helpful.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Package for coding and decoding files with Matheos algorithm from commandline or console in Linux/Unix Environment. Based on Keys stored in files or as hardware locks (on devices). Fast and strong coding. Fast encoding.ONLY BINARY PACKAGES FOR NOW!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A multithreaded GUI based encryption software that can encrypt any file on any platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    anti spam tool. uses an active algorithm (not filtering).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    The Eclipse XML-Security Plug-In allows you to experiment with the W3C recommendations on digital signatures and encryption and to learn all about their background. Arbitrary XML documents can be canonicalized, signed, verified and en- or decrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The Moonbounce API is a set of high level objects that encapsulate pieces of the Bouncycastle lightweight crypto API. Moonbounce significantly simplifies RSA key generation, signing, encryption/decryption and verification of both byte arrays and files.
    Downloads: 0 This Week
    Last Update:
    See Project