Showing 3 open source projects for "diffusion"

View related business solutions
  • Auth0 for AI Agents now in GA Icon
    Auth0 for AI Agents now in GA

    Ready to implement AI with confidence (without sacrificing security)?

    Connect your AI agents to apps and data more securely, give users control over the actions AI agents can perform and the data they can access, and enable human confirmation for critical agent actions.
    Start building today
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 1
    ...It is based on the work by Nintendo(r) European Reasearch and Development (NERD) and the "HireMe" challenge. I've taken the work of NERD a step further and used the input-confusion-diffusion paradigm in conjunction with SHA/256 encryption to generate randomized passwords that cannot be decoded (yet - quantum computers will change this eventually!) The software generates sufficiently random passwords to allow the same plaintext password to be used multiple times without generating the same output. There's probably no real reason to be developing this, but I wanted to use the NERD code in a new way and practice my C++ skills at the same time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Strong cypher with unique recursive alghorythm of bitwise gamma with good avalanche and diffusion. Recurse allow explore quality and parameters at short sequences of data and keys and extrapolate it on very long data and keys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next