180 projects for "encryption algorithm java" with 2 filters applied:

  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • 1
    J2MESafe is an end-user Java application that stores sensitive information like passwords on mobile phones with strong encryption. Requires Java Micro Edition (J2ME) with MIDP-1.0, which is available on most current mobile phones.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    This project provides an interface to Sun's JCE (Java Cryptographic Extensions) as a JSP taglib. It brings strong encryption algorithms such as AES and Blowfish to your JSP applications. It uses the bouncycastle.org cleanroom JCE 1.2.1 implementation as
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    1. project name eXPimenttk (e-SecureOffice) 2.Language Java (req. - at least j2re) 3.target platform - Cross-platform software 4.problem we want to sole- Encryption, Decryption software, File eraser, Messenger, Mailer,Remailer,FireWall 5 target - user
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Secrets is a complete, standalone, personal encryption solution that works much like PGP (Pretty Good Privacy). With Secrets you can encrypt information before emailing it to a friend or coworker, or before storing it on a removable disk. Secrets is buil
    Downloads: 1 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 5
    The Tiny Encryption Algorithm (TEA) was developed by David Wheeler and Roger Needham at the Computer Laboratory of Cambridge University. The variant used was developed by David Wagner. TEACrypt 80x86 is the porting of this algorithm to the 80x86 platform
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    sha is a file hashing utility that uses the NIST's SHA-1, SHA-256, SHA-384, & SHA-512 hash algorithms. It can be used for file integrity checking, remote file comparisons, etc. The portable algorithm implementations can be useful in other projects too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    ObscureEncrypt is a high level security encrypter. It encrypts at three levels, 448 bit Blowfish encryption, Obscurity, high level encryption. Making it almost impossible to decrypt
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Java class file encryption. Class Encrypt is a program that can encrypt a developer's class files and package them into an executable jar file for deployment. The program uses modules for implementing different encryptions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    I needed a library of functions that enabled me to perform hash functions and symmetric cryptography. I chose MD5 initially but eventually chose SHA as the hashing algorithm due to concerns regarding the \'collision resistance\' of MD5 due to weakne
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    A similar to Tripwire, file system integrity checking tool but develop in java and cross platform. This tools checking and source control using check sum algorithm like MD5, SHA and CRC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    <b>SicHer</b> is an encryption client that will allow secure chat across the internet using AES and a Diffe-Hellman key exchange.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    This is a non-causal non-linear encryption system that cannot be cracked by the von-neuman architectures available today
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A cross platform implementation of ECDSA (elliptic curve digital signature algorithm) interface to the aSuretee Token.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    SysK allows to crypt text by using system informations calculate the algorithm. For each user,the crypt algo will be different. It's written in C language for Linux x86. The objective is to allows it to crypt streams, binaries and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A Java library for validation of credit cards. Implements the Luhn Algorithm to ensure the card number is well formed, checks card type prefix's and length. The rules are stored in a text file allowing new cards to be added without changing the source
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Passkeyper is an encrypted password keeper program for the Sharp Zaurus and runs in the PersonalJava environment. It uses the legendary BlowfishJ implementation of Blowfish for encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A Java Swing application to 'securely' store passwords using symmetric encryption. A user can set up one or many 'datastores' of password/username combinations and commit them to disk. They are stored on the file system using PBE Blowfish.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Rijndog is an easy to use file encryption/decryption package making use of the Rijndael AES algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Hyperfile provides an easy-to-use and flexible interface to power and maintain highly dynamic user-defined data sources. The data sources are stored using a secure and reliable encryption algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    KCrypto is a KDE2 file encryptor. It uses the Rijndael ( block cipher algorithm AES winner ) public domain c++ class implementation written by Szymon Stefanek , and it is capable of encrypting and decrypting every kind of file ( text and binary ) i
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    sectar: a program that creates encrypted tape archives(tar files), using the AES algorithm Rijndael. Encryption exported under exemption TSU 740.13. Was star, now sectar.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22
    The RAZip bitstream format was designed to provide a faster random access to compressed data than what is currently possible using the GZIP format. During the desing phase, some other features were added, like encryption and error correction.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    An API and test suite, or possibly an application unto itself, to manage keys and allow mail user agents (such as pine or mutt) to use encryption and authentication systems (such as S/MIME) via the services of external encryption suites (such as OpenSSL)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Secure Java Instant Messenger. Supports asymmetric key encryption of messages. will support multiple protocols (Jabber initially) and multiple UIs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Java Chaotic Random Number Generator - Inspired by chaos theory, the intent of this generator is to produce unseeded, unpredictable numbers. The numbers will not follow a predictable sequence and will not rely on a pseudorandom algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project