Showing 399 open source projects for "encryption algorithm java"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 1
    Convolutional Hashing Algorithm. Provably secure hashing algorithm based on worst case assumptions on cyclic-lattices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Real-Time Proactive Secret Sharing Library for RTAI is an implementation of the Shamir's secret sharing scheme and Herzberg's proactive secret sharing algorithm. The library uses a port of GNU GMP in order to make multiple precision arithmetic operatio
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Open source DRM for MPEG-4 and MPEG-2 adhering to ISO/MPEG IPMP open standards (MPEG IPMP Hooks and IPMP-X), ISMAcryp and OMA DRM 2 specs. Includes CA, PKI, DOI mgmt, ISMA streaming, license server, encoding/encryption, player, plugin architecture, etc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Portable and simple program for text and files encryption (Symmetric, Asymmetric and Steganography)
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    Secure Addressbook is based on the JavaScript implementation of Wheeler & Needham's Block TEA (Tiny Encryption Algorithm) by Chris Veness. It allows maintaining secure records even the on shared hosting server, as data en/decrypted at browser only.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    whbEncrypter is a very simple variable encryption program to encrypt and decrypt a file based on a passkey provided based on the user. It uses a simple encryption algorithm that I wrote for a school project. The passkey can also be the contents of a file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    RC4.NET is a library that adds support for encrypting/decrypting using the symmetric RC4 algorithm in the .NET environment. The library is written in C# language, and performs equally well on both the Microsoft CLR and Mono platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Flash/PHP adaptation of the XTEA encryption algorithm. Allows encryption/decryption of sensitive data using 128-bit key. May be used for network data (HTTP) or offline for implementations like secure CD-ROM projects.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    SwiftCrack is a wireless LAN (WLAN) tool which recovers encryption keys. SwiftCrack operates by proactively monitoring transmissions, injecting traffic with known key streams, computing the encryption key when enough packets have been gathered.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    This is a collection of vb class modules written in native Visual Basic. They provide the following functionality: Processing of very large integer numbers, hashing algorithms, prime number handling and an implementation of the RSA algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    PRE4J (Partial RDF Encryption API for Jena) is a lightweight API for encrypting selected RDF graph elements. PRE4J provides cryptographic extensions to the Jena Semantic Web Framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    CryptoServer is the daemon for handling Sign-Verify, Encryption-Dencryption, Envelop-Openenvelop based on OpenSSL including the SEED symmetric algorithm (Korean Standard Symmetric Algorithm). It's interface is just tcp/ip socket and very easy to handle
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    PalmOS MD5 algorithm Shared Library
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    distDES is a Java RMI-based application which manages load balancing on heterogeneous clusters. Development will extend the theoretical initial implementation to include clustered Rainbow Table generation and encryption algorithm collision detection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    CryptoHelper is a Java program designed to aid in the decryption of classical ciphers, ie pre WWII ciphers. It brings together tools like frequency analysis, friedman tests, enciphering/deciphering for several clasical ciphers, and brute force algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Pot of Gold is an open source implementation of Philippe Oechslin's "Faster Cryptanalytic Time-Memory Trade-Off" paper. It performs precomputation on a particular hash algorithm which can be later used to reverse certain hashes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ADAM is the Active Defense Algorithm and Model. It is a formally defined process of determining appropriate active response actions in the event of an attack. This implementation shows that active defense can be a legitimate and responsible security tool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    DecodeBase64 does exactly what the title says: it decodes strings encoded with the Base64 algorithm. Source code is provided in both Java and C++.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Using one-way hash algorithms and encryption, will generate a password based on a master password and site URL. Java based, so it can run on most operating systems and produce the same password consistantly. Future versions will include a username keyrin
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Java Randomness Test Suite is a gui application to run randomness tests on random stream resource (file or algorithm). Application can be run in command line. Includes general statistical tests, NIST and DIEHARD tests.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    ShadowCrypt is an encryption software, who can encrypt files with all the major known algorithms, and contains a new algorithm beeing developed for my phd.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    TXTCOD encodes and decodes any type of file with a modular algorithm named SAC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    NAC is a collection of tools for cryptography. The goal is to provide simple-to-use crypto tools (like an OTP, String and number generator, public key algorithm...) you can use under Linux, Windows...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    ALIMP (A LIttle More Privacy) is a .NET C# software enabling users to easily cypher and de-cypher files on their computer using common algorithm (DES, 3DES, AES, ...) that are shipped with the .NET Frawemork.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    mircCrypt is an encryption-script which enables you to communicate secured on irc-networks. By using a premade blowfish-algorithm-dll, it secures your chats by using free choosable keys. This script is just the link between the blowfish-dll and mirc.
    Downloads: 0 This Week
    Last Update:
    See Project