Search Results for "java encrypt decrypt" - Page 7

Showing 321 open source projects for "java encrypt decrypt"

View related business solutions
  • Intelligent Automation Solutions Built for Modern Finance Teams Icon
    Intelligent Automation Solutions Built for Modern Finance Teams

    We do CFO stuff.

    Digitally transform your business with workflow automation and integrated payment solutions. Digitally store and secure your data with advanced search and accessibility features that keeps your documents at the tip of your team’s fingers.
    Learn More
  • Tremendous is the global payouts platform for businesses sending gift cards and money at scale. Icon
    Tremendous is the global payouts platform for businesses sending gift cards and money at scale.

    Getting started is simple: add a funding method and place your first order in minutes.

    Trusted by 20,000+ leading organizations, Tremendous has delivered billions of rewards and enables businesses to reach recipients across 230+ countries and regions. Recipients have 2,500+ payout options to choose from, including gift cards, prepaid cards, cash transfers, and charitable donations.
    Learn More
  • 1
    Search Me

    Search Me

    Rich search software for Microsoft windows

    Search Me v1.2.0 ___ 12/10/2014 Search Me software is a windows search utility that let the user find what she/he wants fast. You can customize your search. You can select the size limit, file attribute, and/or file date. .NET 4 is required If you have any questions, feedback, or you want to report a but don't forget to contact me from help menu.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ...ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any type, on a key-phrase of any complexity. ISC is a symmetric key encryption system, which means that both the sender and recipient of a message must possess the key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Kirmah
    Encryption with symmetric-key algorithm Kirmah - generate keys with exotic chars - redefine key length - key mark to ensure decryption capabilities - mix data - fast with multiprocessing - possible compression - gui on gtk3 - cli tool - python3 DEPENDENCIES : ======== python3, python-gobject, gobject-introspection, pygtk 3 modes are available to encrypt : ======== - compression (full / disabled or only final step) - random (simulate a random order - based on crypted key - to randomize data) - mix (mix data according to a generated map - based on crypted key - with addition of noise) Process is as follow : ======== encrypt : file > [ compress > ] encrypt > [randomiz data > mix data > compress > ] file.kmh decrypt: file.kmh > [ uncompress > unmix data > unrandomiz data] > decrypt > [uncompress > ] file ======== for encrypt/decrypt large binary files, use the fastest alternative : split/merge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Contract Management Software | Concord Icon
    Contract Management Software | Concord

    AI-powered contract management that helps businesses track spending, negotiate smarter, and never miss deadlines.

    Concord serves small and mid-sized businesses and Fortune 500 companies. This robust, web-based platform is used by human resource, sales, procurement, and legal teams, and virtually anyone who deals with contracts.
    Learn More
  • 5
    CryptoPad v1.0

    CryptoPad v1.0

    AES-128 bit file encryptor

    CryptoPad is a Java based file encryptor ! It can encrypt every type of file. The icing on the cake is that it's 100% cross-platform. i.e. You can run the same .jar file on Windows, Mac OS, Linux and any OS capable of running JRE 8 :) CryptoPad uses AES-128 bit symmetric key encryption to secure your data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Encrypt

    Allows you to encrypt files and plain text, then back again.

    Encrypt is a small application which allows you to encrypt your files and even write plain text to be encrypted in GZIP code so it effectively cannot be read by humans. Your note passing, personal diary and more is safe. As well as that, it can decode your GZIP messages back into plain text so it can be read again. It is written entirely in Java, and is very easy to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    SFXCompress-gui

    SFXCompress-gui

    Graphical user interface for the utility sfxcompress

    SFXCompress is an utility used to pack and/or encrypt a directory on a self-extracting file. It also includes the calculation of the MD5 function to check if the compressed file is correct. SFXCompress-gui is the graphical user interface written in Java of the Console utility sfxcompress. The Application comes also with the console version. MAC users, download "SFXCompress-bundle.dmg", double click and execute the script "InstallationScript" included into the dmg image. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    e-Exam

    e-Exam

    Testing students has never been easier!

    Decrypt the results with my TEACryptor program using a password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    CaesarEncryption

    Safe encryption for textfiles

    This handy program allows you to swiftly encrypt your textfiles and decrypt them again at any time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Marketing automation for any business | ActiveCampaign Icon
    Marketing automation for any business | ActiveCampaign

    Your team of AI agents handles email, SMS, WhatsApp and more for you

    Active Intelligence revolutionizes how you work. You guide direction while AI handles execution, acts on insights, and shows you the path forward. It's how marketing should be.
    Learn More
  • 10
    ImpraStorage

    ImpraStorage

    ImpraStorage provided a private imap access to store large files

    ...Each part also contains random noise data (lenght depends on a crypt key) to ensure privacy and exclude easy merge without the corresponding key. An index of files stored is encrypt (with the symmetric-key algorithm Kirmah) and regularly updated. Once decrypt, it permit to perform search on the server and download each part. transfert process is transparent. Just vizualize locally the index of stored files and simply select files to download or upload. ImpraStorage automatically launch the parts to download, then merge parts in the appropriate way to rebuild the original file. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    KiwiCryptor

    Basic AES encryption software

    This software, created using Visual Basic, is a basic AES encryption software. Offers features such as encrypt, decrypt and delete files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Mystery

    Mystery

    software cryptographic data protection

    Software tool for cryptographic protection of data is used to encrypt and decrypt files. Signature and check for dokumemntov and text files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    KiwiCryptor(2)

    KiwiCryptor(2)

    Allows users to encrypt text files with the AES standard.

    This software allows users to create and encrypt text files using the AES standard. Users are also able to decrypt and delete these files. When the program is first run, a hidden directory is created in the users documents directory, "Documents\Encrypted", all encrypted files are then stored here in the form of TXT files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    AESTextCrypt

    AESTextCrypt

    Encrypt and decrypt text using AES 256 bit encryption

    AESTextCrypt is an easy-to-use open source tool for text encryption and decryption. Primarily intended for use with email, use it wherever you need to protect text from prying eyes. The encrypted text can be copy/pasted into any text-handling application (e.g. email) instead of plain text. Convenience buttons are provided for clipboard operations. AESTextCrypt uses AES-256 bit encryption which is the strongest available encryption scheme. It also employs bcrypt, which implements...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    CryptoX

    AES Encryption Program

    v2.0.0 (Latest) ---CHANGE LOG--- v1.0.0 - Original Release v1.0.1 - Source Code Cleanup v2.0.0 - Now Features File Encryption Protect your privacy! Encrypt your messages and files with a cryptographic strength of up to 256 bits before sending them to others!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Simple Cipher Decoder

    Simple Cipher Decoder

    Decrypts and encrypts substitution, transposition and vigenere ciphers

    ...If you could write some form of review or send me an email with advice I would greatly appreciate it. This is a series of three simple programs that will allow you to easily encrypt and decrypt text using any combination of substitutions, transpositions, vigenere ciphers or caesar shifts. The programs will not completely solve the ciphers for you haowever they will make it very clear to see how to solve them and ensure that there is no need for tedious manual work.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Substitution Cipher Toolkit

    Substitution Cipher Toolkit

    Substitution cipher toolkit (en/decryption + automatical cracking)

    This substitution cipher toolkit enables you to en- and decrypt texts with substitution cipher, to gather language statistics of a specific language and to crack encrypted texts both manually and automatically. All functions can be accessed via an easy-to-use graphical user interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Open Hacking GateWay Client Crypto

    Open Hacking GateWay Client Crypto

    Open Source HGWC's Encryption

    This anti-cheating software is used by S4 League client to interface and check in real time XTRAP's features and to report the logs to their remote servers. Details: HGWC Version: 57 Protocol Version: 7
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    JCryptor

    JCryptor is an encrypting tool based on the Caesar-cipher.

    JCryptor uses the Caesar-cipher to encrypt keystrokes on-the-fly. It can also be used to decrypt an encrypted text easily. Caesar-cipher is a simple encryption algorithm, developed by Julius Caesar, to encrypt his correspondence with Cicero in the ancient world. Therefore it uses a simple character substitution method to replace a given character by another. A keyshift of thirteen is called ROT13.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    SteganographyA_Setup

    SteganographyA_Setup

    encrypt and decrypt the files

    encryption and decryption of all types very fast
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    NotepadZ_Setup

    NotepadZ_Setup

    advanced notepad

    advanced notepad supports tabs, you can encrypt and decrypt your files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    EnigmaGPG Community

    EnigmaGPG Community

    Sending encrypted data through internet web applications.

    ...Very easy in three steps: Send Messages: 1 - Write a messages 2 - With the right mouse button, select enigma cipher 3 - Send the encrypted message Recieve Messages: 1 - Select the message 2 - With the right mouse button, select enigma decrypt Support Tickets: https://sourceforge.net/p/enigmagpg/tickets/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    The aim of this android application is to provide a secure storage for files on the phone. By using asymmetric cryptography the application allow the user and other apps to encrypt the files using a public key so without the need of a encryption password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Linux user-space implementation of Aladdin's eToken R2 device driver
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB