Showing 23 open source projects for "aes implementation"

View related business solutions
  • Airlock Digital - Application Control (Allowlisting) Made Simple Icon
    Airlock Digital - Application Control (Allowlisting) Made Simple

    Airlock Digital delivers an easy-to-manage and scalable application control solution to protect endpoints with confidence.

    For organizations seeking the most effective way to prevent malware and ransomware in their environments. It has been designed to provide scalable, efficient endpoint security for organizations with even the most diverse architectures and rigorous compliance requirements. Built by practitioners for the world’s largest and most secure organizations, Airlock Digital delivers precision Application Control & Allowlisting for the modern enterprise.
    Learn More
  • MicroStation by Bentley Systems is the trusted computer-aided design (CAD) software built specifically for infrastructure design. Icon
    MicroStation by Bentley Systems is the trusted computer-aided design (CAD) software built specifically for infrastructure design.

    Microstation enables architects, engineers, and designers to create precise 2D and 3D drawings that bring complex projects to life.

    MicroStation is the only computer-aided design software for infrastructure design, helping architects and engineers like you bring their vision to life, present their designs to their clients, and deliver their projects to the community.
    Learn More
  • 1
    ggplot2

    ggplot2

    An implementation of the Grammar of Graphics in R

    ggplot2 is a system written in R for declaratively creating graphics. It is based on The Grammar of Graphics, which focuses on following a layered approach to describe and construct visualizations or graphics in a structured manner. With ggplot2 you simply provide the data, tell ggplot2 how to map variables to aesthetics, what graphical primitives to use, and it will take care of the rest. ggplot2 is over 10 years old and is used by hundreds of thousands of people all over the world for...
    Downloads: 39 This Week
    Last Update:
    See Project
  • 2
    s2n

    s2n

    An implementation of the TLS/SSL protocols

    s2n-tls is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority. It is released and licensed under the Apache License 2.0. If you are building on OSX, you can use build tools like Ninja. The s2n-tls I/O APIs are designed to be intuitive to developers familiar with the widely-used POSIX I/O APIs, and s2n-tls supports blocking, non-blocking, and full-duplex I/O.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    mendelson AS2

    mendelson AS2

    Implementation of the EDIINT AS2 protocol (RFC 4130)

    mendelson AS2 is the JAVA-based open source EDIINT AS2 solution. Monitoring- and configuration GUI, async & sync MDN, signatures, encryption, TLS, web interface, pluggable into any servlet container, partner manager, certificate manager, data compression, optional profiles: MA, FN. Localized to Spanish, Italian, Portuguese, German, English, French, Polish
    Leader badge
    Downloads: 178 This Week
    Last Update:
    See Project
  • 4
    AES_plus_Serpent_in_CBC_mode

    AES_plus_Serpent_in_CBC_mode

    Open-source code that enables you to use AES + Serpent in CBC mode

    ...Licenses from the used libraries are inside of the "LICENSES" directory. *Note that the library with the implementation of AES was slightly modified to make it compatible with the STM32F407VET6. GitHub repository: https://github.com/Northstrix/AES_plus_Serpent_in_CBC_mode_for_microcontrollers
    Downloads: 0 This Week
    Last Update:
    See Project
  • Time tracking software for the global workforce Icon
    Time tracking software for the global workforce

    Teams of all sizes and in various industries that want the best time tracking and employee monitoring solution.

    It's easy with Hubstaff, a time-tracking and workforce management platform that automates almost every aspect of running or growing a business. Teams can track time to projects and to-dos using Hubstaff's desktop, web, or mobile applications. You'll be able to see how much time your team spends on different tasks, plus productivity metrics like activity rates and app usage through Hubstaff's online dashboard. Most of the available features are customizable on a per-user basis, so you can create the team management tool you need.
    Learn More
  • 5
    AES_plus_Blowfish_in_CBC_mode

    AES_plus_Blowfish_in_CBC_mode

    Open-source code that enables you to use AES + Blowfish in CBC mode

    ...Copyright notices from the used libraries are in the "Copyright Notices" directory. *Note that the library with the implementation of AES was slightly modified to make it compatible with the RTL8720DN. GitHub repository: https://github.com/Northstrix/AES_plus_Blowfish_in_CBC_mode
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes:...
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    AES Everywhere

    AES Everywhere

    Cross Language AES 256 Encryption Library

    AES Everywhere is Cross Language Encryption Library that provides the ability to encrypt and decrypt data using a single algorithm in different programming languages and on different platforms. This is an implementation of the AES algorithm, specifically CBC mode, with 256-bit key length and PKCS7 padding. It implements OpenSSL-compatible cryptography with randomly generated salt.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    SSHTOOLS

    SSHTOOLS

    Java SSH API

    This project now hosts the third-generation of Java SSH API, Maverick Synergy. This API builds on the Maverick Legacy commercial APIs and delivers a new API in a unified client/server framework. This API is available to the community under the LGPL open source license. This update includes ed25519 support, support for the new OpenSSH private key file format and stronger key exchange algorithms. The project continues to host both the original API and legacy applications created around...
    Leader badge
    Downloads: 22 This Week
    Last Update:
    See Project
  • 9
    SmarTree

    SmarTree

    Smart Swing JTree evolution

    An extension of the class javax.swing.JTree with a lot of improvements and utilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • See what everyone is allocated to. Projects, clients, meetings - all in one tool. Icon
    See what everyone is allocated to. Projects, clients, meetings - all in one tool.

    The fast, simple way to schedule people, equipment and other resources online.

    Designed to replace clunky, old scheduling spreadsheets, Resource Guru helps managers get organized fast. The platform covers resource planning, resource scheduling, resource management, staff leave management, reporting, and more.
    Free Trial
  • 10

    Infinium-8

    CryptoNote based currency. Increasing block reward

    ...Infinium-8 was launched 7/18/2014 12:00 UTC Specifications PoW algorithm: CryptoNight [1] Max supply: Infinite Block reward: increasing with difficulty growth [2] Block time: 90 seconds Difficulty: Retargets at every block [1] CPU + GPU mining (about 1:1 performance for now). Memory-bound by design using AES encryption and several SHA-3 candidates. [2] Infinium-8 s the cryptocoin with block reward inincreasing together with difficulty. Block reward formula is a fixed point implementation of log2(difficulty). This means that block reward increases much slower than difficulty: for 1 coin to be added to block reward a difficulty must be increased twice. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    PasswordBox

    PasswordBox

    A console-mode program that will keep all your passwords safe

    PasswordBox is a console-mode program that will keep all your passwords safe, in an encrypted database protected by a master password. PasswordBox can also be used to generate secure (random) passwords. This program is written by Mateusz Viste, and uses the AES implementation of Chris Brown to handle all encryption/decryption processes. PasswordBox is available for the following operating systems: DOS, Windows, Linux. Remember, that if you forget your master password, you will have no way to recover the database content. Usage: pbox [--help] [--dump] --help displays a help screen (any unsupported parameter will display it, too) --dump lists all the data of your encrypted database onscreen
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    Large Text File converter

    Java Based Heavy-duty utilitity to process large delimited text files

    ...It provides fully extensible framework based on which Java classes can be created, for example it currently has MD5 conversion capability, based on same design classes for 3DES ,AES or any other Algo can be created. Another strength of this tool is in its configurability, it's design allows to generate as many output files as required from one input file, and at every row of input file validation, extraction, conversion can be applied. Use case Example: legacy system is to be replaced with new advanced system with different DB schema, and the data provided as 100GB size of delimited text data which is to be inserted in 10 different tables of new system DB after validation,date format conversion, rearrangements, and MD5 hashing implementation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Code examples for iDev Blog
    iDev Blog code examples is intended to help novices by exposing small projects developed in Objective-C, Java and C#. You are free to contribute, fork or maybe criticize my work. It's all about the process of learning.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    opacity
    The Open Protocol for Access Control Identification and Ticketing with privacY, is a standard suite of Key Establishment and Authentication protocols based on ECC and AES, for optimized contactless transactions and simple PKI based Key management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    ANts P2P
    ANts P2P realizes a third generation P2P net. It protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 16
    AES JAVA IMPLEMENTATION
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    DazioAES is a password manager: it's an application protected by a single password that stores multiple other password or informations in an encrypted way. It uses Bouncycastle crypto library (classes from) and their AES encryption implementation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    JRijndael is a 100% pure Java implementation of the popular Rijndael (aka AES) cryptography algorithm. It's designed to be implemented as easily as possible and features ECB, padding, and a simple API.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    The gruft library is a fast implementation of several cryptographic functions in JavaScript: MD5, SHA-1, SHA-256, Tiger/192, AES-Rijndael.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The SSTCP protocol permits to establish a simple TCP/IP connexion across multiple AES secured channel. Simple but (/so?) secured and strong cryptographic methods are used. OpenSSTCP is the LGPL implementation of the SSTCP protocol.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This project provides an interface to Sun's JCE (Java Cryptographic Extensions) as a JSP taglib. It brings strong encryption algorithms such as AES and Blowfish to your JSP applications. It uses the bouncycastle.org cleanroom JCE 1.2.1 implementation as
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    KCrypto is a KDE2 file encryptor. It uses the Rijndael ( block cipher algorithm AES winner ) public domain c++ class implementation written by Szymon Stefanek , and it is capable of encrypting and decrypting every kind of file ( text and binary ) i
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    This project aims to provide a full implementation of the GEM VDI & AES API's on a truly multi-tasking, network aware system (Linux Kernel) with the appropriate modifications to support the advanced functionality of the underlying OS.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB