Search Results for "encryption algorithm java" - Page 5

Showing 878 open source projects for "encryption algorithm java"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1

    SHA256-in-C

    SHA-256 Algorithm Implementation in C

    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    LEACrypt

    LEACrypt

    TTAK.KO-12.0223 Lightweight Encryption Algorithm Tool

    The Lightweight Encryption Algorithm (also known as LEA) is a 128-bit block cipher developed by South Korea in 2013 to provide confidentiality in high-speed environments such as big data and cloud computing, as well as lightweight environments such as IoT devices and mobile devices. LEA is one of the cryptographic algorithms approved by the Korean Cryptographic Module Validation Program (KCMVP) and is the national standard of Republic of Korea (KS X 3246).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    BD-Func

    Bidirectional Functional Enrichment of Gene Expression Data

    BD-Func is an algorithm to predict activation or inhibition of pathways based upon gene expression patterns. If you use BD-Func, please cite: Warden C, Kanaya N, Chen S, and Yuan Y-C. (2013) BD-Func: A Streamlined Algorithm for Predicting Activation and Inhibition of Pathways. peerJ, 1:e159
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    KeyHolder password manager

    KeyHolder password manager

    Store your passwords in an offline encrypted file!

    Need a JDK to run, download it here: https://www.oracle.com/java/technologies/downloads/
    Downloads: 2 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 5
    Worderize Lite

    Worderize Lite

    Worderize is designed to make the language learning more effective.

    Worderize Lite is an open-source software that is designed to make the language learning process more effective. New features in V2.0: German and French localization; You can now add definition to words; "Edit" button for words and their definitions; DES + AES encryption. New features in V2.1: Support for Hebrew language. For more information please visit: https://github.com/Northstrix/Worderize Worderize Lite requires java to be installed on your computer. You can download java here https://www.java.com/en/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    File-Splitter

    File-Splitter

    A simple tool for split, zip, and encrypt files

    Need a JDK to run, download it here: https://www.oracle.com/java/technologies/downloads/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    GMSM Toolkit ☭

    GMSM Toolkit ☭

    Cross-platform GMSM Security Suite written in Go

    GMSM Toolkit v1.2.3 ☭ Multi purpose cross-platform cryptography tool for asymmetric/symmetric encryption, cipher-based message authentication code (CMAC), recursive hash digest, hash-based message authentication code (HMAC) and PBKDF2 function. SM2/SM3/SM4 Chinese National Standard Algoritms: • GM/T 0003-2012 - SM2 Public key algorithm 256-bit. • GM/T 0004-2012 - SM3 Message digest algorithm. 256-bit hash value. • GM/T 0002-2012 - SM4 Symmetric block cipher with 128-bit key. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    AcoPath for Java

    Ant Colony Optimization algorithm for the shortest path problem.

    The shortest path problem is solved by many methods. Heuristics offer lower complexity in expense of accuracy. There are many use cases where the lower accuracy is acceptable in return of lower consumption of computing resources. The basic idea of the Ant System is that virtual ants are exploited for finding paths with a specific property, e.g., short distance between physical nodes, in the same way nature guides physical ants.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9

    NtrUtil

    A command line interface for encryption and decryption using the NTRU

    A command line interface for encryption and decryption using the NTRU cryptography algorithm. "NTRU is a public key cryptosystem that is considered unbreakable even with quantum computers. Commonly used cryptosystems like RSA or ECC, on the other hand, will be broken if and when quantum computers become available."-NTRU
    Downloads: 0 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 10
    SM3SUM(2)

    SM3SUM(2)

    Command-line GM/T 0004-2012 SM3 Recursive Hashsum Tool

    This new module can be used to compute SM3 message digest of files or memory blocks according to the specification GM/T 004-2012 Cryptographic Hash Algorithm SM3, published by State Encryption Management Bureau, China. This project is licensed under the ISC License. Copyright © 2020-2022 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/sm3sum Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Client-side Encryption Amazon DynamoDB

    Client-side Encryption Amazon DynamoDB

    Amazon DynamoDB Encryption Client for Java

    The Amazon DynamoDB Client-side Encryption in Java supports encryption and signing of your data when stored in Amazon DynamoDB. A typical use of this library is when you are using DynamoDBMapper, where transparent protection of all objects serialized through the mapper can be enabled via configuring an AttributeEncryptor. Use SaveBehavior.PUT or SaveBehavior.CLOBBER with AttributeEncryptor.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 12
    JQuickBase

    JQuickBase

    elementary database files for Java, B+ tree index files, ISAM

    Java API to realize quick ISAM (Index Sequential Access Method) functionality for application in the file system. Includes scalable database files w/ space recovery and variable record length, scalable B+Tree index files. Supports file backup and restore. Two package types: one with and one without strong file encryption using Twofish algorithm and state-of-the-art encryption technology.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    LeetCode Animation

    LeetCode Animation

    Demonstrate all the questions on LeetCode in the form of animation

    LeetCodeAnimation is an educational open source project by MisterBooo that visually demonstrates algorithm problems from LeetCode through animations. The goal of the project is to help learners understand complex algorithmic concepts intuitively by showing step-by-step animated explanations instead of relying solely on static code or text. Each animation corresponds to a specific problem and illustrates how data structures and algorithms operate dynamically, making it easier to grasp their...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    proreports

    proreports

    Simple Reporting System

    ProReports is simple reporting system designed to generate reports in popular office formats - PDF, XLS, RTF, HTML, TXT, XML, JSON, CSV, PNG, GIF. These reports are generated based on the definition in the internal database system. ProReports supports jrxml (JasperReport) format. This type of report templates can be prepared in external editor, such as iReport. Also user can prepare report in internal format of ProReports (simple Visual Programming Language mixed with PHP5 and JAVA or...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    LiteMessage

    A lightweight, peer-to-peer messaging program.

    A lightweight peer-to-peer messaging program that runs in the console. It also has a GUI version. It is currently very early in development. It is implemented in Java, so it is cross-platform. Currently developed using Java 8 (aka 1.8) It is distributed under the 3-clause BSD license. Planned features in the future include message encryption and file transfers. The most up-up-to-date source can be found on GitHub: https://github.com/cguy777/LiteMessage The MTools library can be found here: https://github.com/cguy777/MTools
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    S-DES Crypto App

    Encryption/Decryption demonstration app using the S-DES algorithm

    Encryption/Decryption demonstration app using the S-DES algorithm. Use the Java runtime environment 11 for execution. The GUI pops up that allows entering a 10-bit encryption/decryption key in binary (0, 1 digits) and the plaintext/ciphertext in the same form (8-bit). Executing the algorithm, decription of the encoding/decoding functionality is provided in the three main text boxes.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    Stegofierfx

    Stegofierfx

    It is a simple and user friendly application to hide messages in image

    Stegofier is a simple and user friendly interface to hide and retrieve message inside any Image file (Specifically for Portable Network Graphics (.PNG) files) with a support for range of Devices and Operating Systems.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    TengineKit

    TengineKit

    TengineKit - Free, Fast, Easy, Real-Time Face Detection

    Free, Fast, Easy, Real-Time Face Detection & Face Landmarks & Face Attributes & Hand Detection & Hand Landmarks & Body Detection & Body Landmarks & Iris Landmarks & Yolov5 SDK On Mobile. TengineKit is an easy-to-integrate AI algorithm SDK. At present, it can run on various mobile phones at very low latency. We will continue to update this project for better results and better performance!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Jasmine

    Jasmine

    Super fast Java aexpression and algorithm evaluator

    V1.0.1 fully compatible with PS2 and 3. Jasmine uses the ASM byte code manipulation library (http://asm.ow2.org/) to create Java byte code to evaluate numerical expressions and algorithms. Evaluation of compiled expressions is very fast, in most cases it is faster than the equivalent byte code produced by the Java compiler (javac).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Starlight Fabric

    Starlight Fabric

    Rewrites the light engine to fix lighting performance

    Starlight is a performance optimization project for Minecraft that completely rewrites the game’s internal lighting engine to improve efficiency and reduce lighting-related lag. The original Minecraft lighting system can be computationally expensive when generating terrain or updating large structures, which can cause performance problems on servers and heavily modded environments. Starlight replaces this system with a redesigned algorithm that processes lighting calculations more...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 21
    KISA Toolkit

    KISA Toolkit

    Korea Internet & Security Agency's Cipher Suite written in Go

    ...The Korea Internet & Security Agency (KISA) is distributing source codes that you can easily use. South Korean National Standard Algorithms: • LSH Message digest algorithm. 256/512-bit hash value. • ARIA 128-bit Block cipher with 128/192/256-bit keys. • LEA 128-bit Block cipher with 128/192/256-bit keys. • SEED 128-bit Block cipher with 128/256-bit keys. • HIGHT 64-bit Block cipher with 128bit key. Cryptographic Functions: • Symmetric Encryption/Decryption • Hash Digest • CMAC (Cipher-based message authentication code) • HMAC (Hash-based message authentication code) • PBKDF2 (Password-based key derivation function 2) Copyright (c) 2020-2021 Pedro Albanese - ALBANESE Lab Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    FinalCrypt

    FinalCrypt

    FinalCrypt - Unbreakable One-Time Pad Encryption

    Why FinalCrypt? 1. Most people choose Disk-Encryption as it's easier to unlock a whole drive, but Big-Brother or Malware can then also read all your files. Only use File-Encryption! 2. Most software uses recently broken AES encryption. 3. Soon The Shor's algorithm will instantly break all assymmetric encryption with Quantum Computers. 4. FinalCrypt uses Symmetric One Time Pad Encryption, which is the most unbreakable encryption there is. 5. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 23

    commons-crypt

    A library for easy use of symmetric encryption and decryption in java

    A library for easy use of symmetric encryption and decryption in java. Encrypt and decrypt with one line of code using common algorithms like AES. Requires Java 7 or later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Drive Badger

    Drive Badger

    Open source platform for covert data exfiltration operations.

    Drive Badger is a software tool for data exfiltration – which means, for copying data from the computer to external USB drive. Unlike many other tools from IT security area, it's not a Proof-of-Concept kind of tool, bringing some groundbreaking techniques. Everything, what Drive Badger does, can be as well run manually, step by step. Instead, what Drive Badger really does, is doing it all better, by putting the maximum focus on:
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    BifurcumLib

    BifurcumLib

    A library for running through a directional graph.

    This is the library for the project Bifurcum. It does all the work. It has a simple algorithm (Deep First Search with modifications) and allows sorting children before traversing. This library sums up the authors 4-years experience when programming a commercial tool for graph traversing (which used a much more advanced algorithm) and coaching its users.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB