Showing 207 open source projects for "algorithms"

View related business solutions
  • Professional Email Hosting for Small Business | Greatmail Icon
    Professional Email Hosting for Small Business | Greatmail

    Ready to switch to a more reliable and secure email hosting solution?

    Dependable cloud based email hosting with spam filtering, antivirus protection, generous storage and webmail. Compatible with Outlook and all other POP3/IMAP clients. High volume SMTP service for responsible senders. Outbound relay service for transactional messages, email marketing campaigns, newsletters and other applications. Dedicated email servers, clustering and multiple IP load balancing for high volume senders. Fixed monthly cost with unlimited sending and reputation monitoring. Greatmail is an email service provider (ESP) specializing in business class email hosting, SMTP hosting and email servers. For ISPs, application programmers and cloud developers, we also provide custom solutions including dedicated IP servers and process specific, load balanced configurations with multiple servers.
    Learn More
  • Point of Sale. Powerful and Simple. Icon
    Point of Sale. Powerful and Simple.

    For retail store owners and multi-location retail operations needing a tool to manage sales, inventory, staff and channels in one place

    Vibe Retail is an all-in-one retail point-of-sale and operations platform built for single-store and multi-location retailers seeking to unify inventory, sales, staff and customer data from one mobile-friendly interface. The system lets you track inventory across locations and warehouses, handle item variations (size, color, material), manage purchase orders and supplier deliveries, print custom barcodes, and transfer stock between stores in real time. On the sales side, Vibe supports multiple payment types (cards, cash, checks, gift cards, EBT), layaway workflows, serial number tracking, delivery management, loyalty programs and branded receipts. Retailers can integrate with online platforms (such as Shopify and WooCommerce), sync in-store and online sales, access 40+ real-time reports on sales, inventory and performance, set up promotions and discounts, and print receipts from mobile devices.
    Learn More
  • 1
    CryptoSwift

    CryptoSwift

    Collection of standard and secure cryptographic algorithms

    The master branch follows the latest currently released version of Swift. If you need an earlier version for an older version of Swift, you can specify its version in your Podfile or use the code on the branch for that version. Older branches are unsupported. Swift Package Manager uses debug configuration for debug Xcode build, that may result in significant (up to x10000) worse performance. Performance characteristic is different in Release build. XCFrameworks require Xcode 11 or later and...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    xxHash

    xxHash

    Extremely fast non-cryptographic hash algorithm

    xxHash is an extremely fast non-cryptographic hash algorithm, working at RAM speed limit. It is proposed in four flavors (XXH32, XXH64, XXH3_64bits and XXH3_128bits). The latest variant, XXH3, offers improved performance across the board, especially on small data. It successfully completes the SMHasher test suite which evaluates collision, dispersion and randomness qualities of hash functions. Code is highly portable, and hashes are identical across all platforms (little / big endian)....
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    kcptun

    kcptun

    A stable and secure tunnel based on KCP with N:M multiplexing and FEC

    kcptun is a stable and secure tunnel based on KCP with N:M multiplexing and FEC. Available for ARM, MIPS, 386 and AMD64. kcptun is shipped with builtin packet encryption powered by various block encryption algorithms and works in Cipher Feedback Mode, for each packet to be sent, the encryption process will start from encrypting a nonce from the system entropy, so encryption to same plaintexts never leads to a same ciphertexts thereafter. kcptun made use of ReedSolomon-Codes to recover lost packets, which requires massive amount of computation, a low-end ARM device cannot satisfy kcptun well. ...
    Downloads: 26 This Week
    Last Update:
    See Project
  • 4
    Cryptol

    Cryptol

    Cryptol: The Language of Cryptography

    Cryptol is a domain-specific language (DSL) for specifying and verifying cryptographic algorithms. Developed by Galois, Cryptol provides a high-level mathematical syntax for describing cryptographic primitives and enables formal verification of algorithm properties. It is used in academic, research, and defense sectors to validate correctness and security through symbolic execution and model checking, ensuring critical cryptographic code is free of design flaws.
    Downloads: 9 This Week
    Last Update:
    See Project
  • Globalscape Enhanced File Transfer (EFT) is a best-in-class managed file transfer (MFT) solution Icon
    Globalscape Enhanced File Transfer (EFT) is a best-in-class managed file transfer (MFT) solution

    For Windows-Centric Organizations Looking for Secure File Transfer solutions

    Globalscape’s Enhanced File Transfer (EFT) platform is a comprehensive, user-friendly managed file transfer (MFT) software. Thousands of Windows-Centric Organizations trust Globalscape EFT for their mission-critical file transfers.
    Learn More
  • 5
    AWS Encryption SDK for Java
    The AWS Encryption SDK is a client-side encryption library designed to make it easy for everyone to encrypt and decrypt data using industry standards and best practices. It enables you to focus on the core functionality of your application, rather than on how to best encrypt and decrypt your data. The AWS Encryption SDK is provided free of charge under the Apache 2.0 license. With the AWS Encryption SDK, you define a master key provider (Java and Python) or a keyring (C, C#/.NET, and...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    libsodium

    libsodium

    A modern, portable, easy to use crypto library

    libsodium is a modern, portable, and easy-to-use cryptographic library that serves as an API-compatible fork of NaCl. Consistent behavior and formats across supported platforms. It enhances the original design with build and portability improvements, making it widely deployable across platforms for secure encryption, signatures, hashing, and key derivation. Digital signature creation and verification support. Adds extended cryptographic primitives like BLAKE2 and ChaCha20-Poly1305 beyond NaCl.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 7
    s2n-quic

    s2n-quic

    An implementation of the IETF QUIC protocol

    s2n-quic is AWS’s open-source implementation of the IETF QUIC transport protocol, written in Rust and designed for performance, security, and modern usage. QUIC is a UDP-based, multiplexed, encrypted transport layer that underpins HTTP/3 and addresses issues such as head-of-line blocking and faster handshake times compared to TCP+TLS. This library integrates with AWS’s s2n-tls or rustls for the TLS 1.3 handshake and leverages Rust’s memory and thread safety guarantees to deliver a robust...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    RHash
    RHash (Recursive Hasher) is a console utility for computing and verifying hash sums of files. It supports CRC32, CRC32C, MD4, MD5, SHA1, SHA256, SHA512, SHA3, AICH, ED2K, DC++ TTH, BTIH, Tiger, GOST R 34.11-2012, RIPEMD-160, HAS-160, EDON-R, and Whirlpool.
    Leader badge
    Downloads: 1,069 This Week
    Last Update:
    See Project
  • 9
    Msieve is a C library implementing a suite of algorithms to factor large integers. It contains an implementation of the SIQS and GNFS algorithms; the latter has helped complete some of the largest public factorizations known
    Leader badge
    Downloads: 102 This Week
    Last Update:
    See Project
  • The Cloud Sales Acceleration Platform Icon
    The Cloud Sales Acceleration Platform

    For businesses wanting a platform to list, manage, and co-sell on cloud marketplaces with minimal engineering effort

    Streamline and automate your cloud sales cycle, enhance operational efficiency, and capitalize on marketplace opportunities with the Clazar Cloud Sales Acceleration Platform.
    Learn More
  • 10
    VeraCrypt

    VeraCrypt

    Open source disk encryption with strong security for the Paranoid

    VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data. ...
    Leader badge
    Downloads: 2,092 This Week
    Last Update:
    See Project
  • 11

    Largest Generic Hash and HMAC Program

    57 Hash Functions In One Program, plus each with HMAC or KMAC

    FEHASHMAC is the largest collection of publicly known hash algorithms integrated into a command-line utility. FEHASHMAC contains a set of known test vectors and results for each algorithm such that the correct implementation for each hardware platform and compiler version can directly be verified. Currently 57 hash algorithms like sha1 sha224 sha256 sha384 sha512 and variants, sha3 and shake, all SHA3 finalists and blake3, md2 md4 md5 md6, rmd128 rmd160 rmd256 rmd320, whirl gost lash160 lash256 lash384 lash512 tiger2 and RFC 2104 HMAC and KMAC support are included, plus SHA3 extensions kmac128, kmac256, kmacxof128, kmacxof256 for message.
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    EJBCA, JEE PKI Certificate Authority
    EJBCA is an enterprise class PKI Certificate Authority built on JEE technology. It is a robust, high performance, platform independent, flexible, and component based CA to be used standalone or integrated in other JEE applications.
    Leader badge
    Downloads: 156 This Week
    Last Update:
    See Project
  • 13
    PureBasic Shamir Secret Sharing

    PureBasic Shamir Secret Sharing

    Open-source PureBasic implementation of the Shamir Secret Sharing

    PureBasic Shamir Secret Sharing is an open-source, self-contained and educational implementation of the Shamir Secret Sharing Scheme, written entirely in PureBasic. Shamir Secret Sharing is a cryptographic method that splits a secret into multiple parts (shares), such that any combination of at least T shares can reconstruct the original secret, while any number of shares fewer than T reveals no usable information. This implementation operates over the finite field GF(257), allowing...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    HashSum is a .NET port from GNU's md5sum and sha1sum. It supports: hash algorithm selection between MD5 and SHA1 (more could be added later) and compatibility between HashSum and GNU's checksum file format
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    PetoronHash2

    PetoronHash2

    PH2 Permutation-based cryptographic post-quantum hash library with duplex construction (C++20)

    PetoronHash2 (PH2) is a standalone ARX-based sponge construction that combines: A 4096-bit internal permutation core A sponge/duplex architecture with explicit capacity separation An extendable-output function (XOF) Memory-hard (HARD) and burn (BURN) modes A structured tagged absorb scheme A parameterized architecture suitable for hashing, KDF, and stress-oriented derivation PH2 is designed as a wide-state cryptographic primitive with explicit domain separation and configurable output...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    PetoronHash-System

    PetoronHash-System

    PHASH | post-quantum XOF hashing algorithm | C++20

    PHASH is a self-contained, dependency-free, post-quantum XOF hashing algorithm implemented in modern C++20. This release delivers the first fully stable production implementation of the PetoronHash-System — a 1600-bit sponge-based hash function with domain separation, extendable output, and deterministic behavior. Key Features No external dependencies — pure C++20 implementation. Extendable Output (XOF) — supports arbitrary output length (256–8192+ bits). Post-quantum oriented design...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    EasyJCE

    Provides encryption & password hashing for your app or Hibernate POJOs

    ...A set of Hibernate user types is included to transparently integrate encryption into the data layer in a JPA/Hibernate environment, ensuring data is persisted in its encrypted form while obscuring encryption and decryption logic from application code. EasyJCE supports most algorithms implemented for the JCE, including those provided by third-party encryption service providers. Integrated MAC (Message Authentication Code) support can optionally be used to ensure data integrity and indicate possible data tampering. EasyJCE also provides basic encoding and decoding facilities for transmitting encrypted binary data through mediums which are limited to printable ASCII characters, such as email messages or URL's.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    AES_in_CBC_mode_for_MCUs

    AES_in_CBC_mode_for_MCUs

    Open-source code that enables you to use AES in CBC mode

    AES_in_CBC_mode_for_microcontrollers is an open-source code that enables you to easily integrate the AES encryption algorithm in CBC mode to your project. Based on the work of https://github.com/zhouyangchao/AES GitHub Page: https://github.com/Northstrix/AES_in_CBC_mode_for_microcontrollers
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    antigift

    antigift

    antigift is simple cross-platform, files & folders encryption tool

    antigift could be used for encryption files & folders on USB-flash or HDD partition. Works on Linux (including Android), Windows, Mac OS X, FreeBSD, DragonFly BSD and other on OSes. Do not required installation. Include WIPE tool for wiping free space and tool for recovery forgotten key. See documentation at http://sourceforge.net/p/antigift/wiki/Home/ antigift простой и кросс-платформенный инструмент для шифрования файлов и папок(с ccrypt в качестве основы) Подробности см. на...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Hash Latch
    The hash latch generates keys in a manner similar to how some cryptocurrencies are mined. It takes a string and brute-forces a prefix for it so that the hash of the string with the prefix has a certain number of leading zeroes. But that alone would've been too easy to hack. To prevent an attacker from forging the keys by generating a new prefix: the hash latch doesn't output the keys in the plaintext. Instead, it encrypts the key and outputs the ciphertext. That means that instead of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    GmSSL for Windows

    GmSSL for Windows

    支持国密SM2/SM3/SM4/SM9/SSL的密码工具箱

    GmSSL is an open-source library that supports Chinese cryptographic algorithms (国密) and security protocols, such as SM2, SM3, SM4, SM9, and SSL/TLS.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 22

    badpi-cyphering

    file/stream encryption/decryption/CRC based on PI compute algorithm

    Encryption/decryption/CRC algorithm base on PI calculation. The private Key is composed of : - a starting position nb (iterations before starting encrypt) - a loop nb (in-between iteration) - small spot nb for the position in floating number part Challenge is proposed in my website.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    FastRC4

    Optimized implementation of RC4 (Rivest Cipher 4, ARCFOUR) in ASMx64.

    Optimized implementation of RC4 (Rivest Cipher 4, ARCFOUR) in ASM (x64) for Linux and Windows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    ...Key derivation functions: PBKDF2, scrypt, Argon2, HKDF. Includes sample command-line tools: - 'digest' - for calculating and verifying file checksum(s) using any of the supported hash algorithms (similar to md5sum or RHash). - 'cryptor' - for file encryption using Serpent-256 algorithm in AEAD mode. Check out the cppcrypto web site linked below for programming documentation.
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 25

    SHA256-in-C

    SHA-256 Algorithm Implementation in C

    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB