Search Results for "blowfish encryption algorithm source code in java" - Page 2

Showing 155 open source projects for "blowfish encryption algorithm source code in java"

View related business solutions
  • PairSoft | AP Automation and Doc Management Icon
    PairSoft | AP Automation and Doc Management

    Free your team from manual processes.

    Streamline operations and elevate your team's efficiency with PairSoft. Our AP automation, procurement, and document management solutions eliminate manual processes, cut costs, and free your team to focus on strategic initiatives. Experience our state-of-the-art invoice-to-pay solution, now integrated with advanced AI technology for faster, smarter results. Our customers report a significant 70% reduction in approval times and annual savings of $62,000 in employee hours. At PairSoft, we aim to transform your business operations through automation. Explore the future of automation at pairsoft.com, where you can leverage cutting-edge features like invoice capture, OCR, and comprehensive AP automation to transform your workflow. Whether you are a small business or a large enterprise, our solutions are designed to scale with your needs, providing robust functionality and ease of use. Join the growing number of businesses that trust PairSoft.
    Learn More
  • Track time for payroll, billing and productivity Icon
    Track time for payroll, billing and productivity

    Flexible time and billing software that enables teams to easily track time and expenses for payroll, projects, and client billing.

    Because time is money, and we understand how challenging it can be to keep track of employee hours. The constant reminder to log timesheets so your business can increase billables, run an accurate payroll and remove the guesswork from project estimates – we get it.
    Learn More
  • 1
    GmSSL

    GmSSL

    Password toolbox that supports national secret

    GmSSL is an open source library of domestic commercial ciphers independently developed by Peking University. It realizes comprehensive functional coverage of national secret algorithms, standards, and secure communication protocols. It supports mainstream operating systems and processors including mobile terminals, and supports cryptographic keys, Cipher cards and other typical domestic cryptographic hardware provide feature-rich command line tools and multiple compiled language programming...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2
    AES_plus_Blowfish_in_CBC_mode

    AES_plus_Blowfish_in_CBC_mode

    Open-source code that enables you to use AES + Blowfish in CBC mode

    The AES_plus_Blowfish_in_CBC_mode repository contains two sketches that enable you to encrypt your data using a combination of AES and Blowfish encryption algorithms in CBC mode. The only difference between them, from the functional point of view, is that one verifies the integrity of the decrypted data (plaintext) while the other doesn't. Copyright/Ownership/Licenses Attention! I didn't develop the libraries utilized by these sketches. I took them from the following...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Advanced Trigonometry Calculator

    Advanced Trigonometry Calculator

    Precision Trigonometry: Advanced Calculator for Complex Math

    Advanced Trigonometry Calculator is equipped with a user-friendly interface that allows for easy input of problems and instant computation. Professionals such as engineers who need to perform advanced trigonometric calculations in their work will find this tool extremely useful. ATC Online Alpha: https://advantrigoncalc.sourceforge.io/atc/ More info by clicking below: https://advantrigoncalc.sourceforge.io/ Advanced Trigonometry Calculator was only and always only developed by...
    Leader badge
    Downloads: 13 This Week
    Last Update:
    See Project
  • 4
    Serpent_in_CBC_mode_for_MCUs

    Serpent_in_CBC_mode_for_MCUs

    Open-source code that enables you to use Serpent in CBC mode

    Serpent_in_CBC_mode_for_microcontrollers is an open-source code that enables you to easily integrate the Serpent encryption algorithm in CBC mode to your project. Based on the work of https://github.com/peterferrie/serpent GitHub Page: https://github.com/Northstrix/Serpent_in_CBC_mode_for_microcontrollers
    Downloads: 0 This Week
    Last Update:
    See Project
  • Peer to Peer Recognition Brings Teams Together Icon
    Peer to Peer Recognition Brings Teams Together

    The modern employee engagement platform for the modern workforce

    Create a positive and energetic workplace environment with Motivosity, an innovative employee recognition and engagement platform. With Motivosity, employees can give each other small monetary bonuses for doing great things, promoting trust, collaboration, and appreciation in the workplace. The software solution comes with features such as an open-currency open-reward system, insights and analytics, dynamic organization chart, award programs, milestones, and more.
    Learn More
  • 5
    NKTgLaw

    NKTgLaw

    Core library & API for the NKTg Law (Nguyen Khanh Tung). Includes core

    Core library & API for the NKTg Law (Nguyen Khanh Tung). Includes core implementation, REST/gRPC API, and 150+ client wrappers
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    JVerifier An hash code verifier JVerifier is a command line application that verify checksums from a GNU-style file. Source code available on https://github.com/davidesestiliwork/JVerifier2 Usage: param 1: file name, param 2: algorithm, param 3: baseDir Example: java -jar JVerifier2.jar SHA1SUMS SHA-1 /home/davide Note: this program requires GnuPG to work properly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    KhadashPay

    KhadashPay

    The KhadashPay project is an open-source payment system.

    The KhadashPay project is my attempt to make a payment system from scratch. As for the customers of the store where the KhadashPay is deployed, Khadash pay doesn't keep any logs whatsoever and doesn't require a bit of your personal information to create an account. You can find the tutorials here: V2.0 (ESP32 Version): https://www.instructables.com/KhadashPay-V20/ V2.0 (Raspberry Pi Pico Version): https://www.instructables.com/KhadashPay-V20-Raspberry-Pi-Pico-Version/ V3.0...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The Art of Programming

    The Art of Programming

    A collection of practical tips can be found at the bottom of this page

    The Art of Programming (Second Edition) is a curated collection of programming problems and solutions originally derived from the Microsoft 100 Interview Questions blog series, later refined into a long-running tutorial and ultimately a published book. Created by July, the series began in 2010 and has since evolved into an in-depth exploration of algorithmic thinking, data structures, and coding interview preparation. The repository brings together 42 classic programming problems from the...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9

    Jadecy

    Java lib to compute (code) deps, SCCs, and cycles (Johnson algorithm).

    Jadecy (Java Dependencies and Cycles) is a Java library to compute dependencies (elements depended on, or depending), strongly connected components, and cycles, in general directed graphs, or classes or packages dependencies graphs parsed from class files (major version <= 52, else does best effort). It uses Tarjan's algorithm for SCCs computation, and Johnson's algorithm for exhaustive cycles computation, with continuations instead of recursion, which allows to handle large graphs (<...
    Downloads: 0 This Week
    Last Update:
    See Project
  • MicroStation by Bentley Systems is the trusted computer-aided design (CAD) software built specifically for infrastructure design. Icon
    MicroStation by Bentley Systems is the trusted computer-aided design (CAD) software built specifically for infrastructure design.

    Microstation enables architects, engineers, and designers to create precise 2D and 3D drawings that bring complex projects to life.

    MicroStation is the only computer-aided design software for infrastructure design, helping architects and engineers like you bring their vision to life, present their designs to their clients, and deliver their projects to the community.
    Learn More
  • 10
    Hashids

    Hashids

    A small PHP library to generate YouTube-like IDs from numbers

    Hashids is a small open-source library that generates short, unique, non-sequential ids from numbers. It converts numbers like 347 into strings like “yr8”, or array of numbers like [27, 986] into “3kTMd”. You can also decode those ids back. This is useful in bundling several parameters into one or simply using them as short UIDs. Hashids works similarly to the way integers are converted to hex, but with a few exceptions. The alphabet is not base16, but base base62 by default. The alphabet is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    LEACrypt

    LEACrypt

    TTAK.KO-12.0223 Lightweight Encryption Algorithm Tool

    ...LEA is included in the ISO/IEC 29192-2:2019 standard (Information security - Lightweight cryptography - Part 2: Block ciphers). This project is licensed under the ISC License. Copyright © 2020-2021 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/leacrypt Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    GMSM Toolkit ☭

    GMSM Toolkit ☭

    Cross-platform GMSM Security Suite written in Go

    GMSM Toolkit v1.2.3 ☭ Multi purpose cross-platform cryptography tool for asymmetric/symmetric encryption, cipher-based message authentication code (CMAC), recursive hash digest, hash-based message authentication code (HMAC) and PBKDF2 function. SM2/SM3/SM4 Chinese National Standard Algoritms: • GM/T 0003-2012 - SM2 Public key algorithm 256-bit. • GM/T 0004-2012 - SM3 Message digest algorithm. 256-bit hash value. • GM/T 0002-2012 - SM4 Symmetric block cipher with 128-bit key. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    NtrUtil

    A command line interface for encryption and decryption using the NTRU

    A command line interface for encryption and decryption using the NTRU cryptography algorithm. "NTRU is a public key cryptosystem that is considered unbreakable even with quantum computers. Commonly used cryptosystems like RSA or ECC, on the other hand, will be broken if and when quantum computers become available."-NTRU
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    SM3SUM(2)

    SM3SUM(2)

    Command-line GM/T 0004-2012 SM3 Recursive Hashsum Tool

    This new module can be used to compute SM3 message digest of files or memory blocks according to the specification GM/T 004-2012 Cryptographic Hash Algorithm SM3, published by State Encryption Management Bureau, China. This project is licensed under the ISC License. Copyright © 2020-2022 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/sm3sum Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    JQuickBase

    JQuickBase

    elementary database files for Java, B+ tree index files, ISAM

    Java API to realize quick ISAM (Index Sequential Access Method) functionality for application in the file system. Includes scalable database files w/ space recovery and variable record length, scalable B+Tree index files. Supports file backup and restore. Two package types: one with and one without strong file encryption using Twofish algorithm and state-of-the-art encryption technology.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    LeetCode Animation

    LeetCode Animation

    Demonstrate all the questions on LeetCode in the form of animation

    LeetCodeAnimation is an educational open source project by MisterBooo that visually demonstrates algorithm problems from LeetCode through animations. The goal of the project is to help learners understand complex algorithmic concepts intuitively by showing step-by-step animated explanations instead of relying solely on static code or text. Each animation corresponds to a specific problem and illustrates how data structures and algorithms operate dynamically, making it easier to grasp their...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17

    S-DES Crypto App

    Encryption/Decryption demonstration app using the S-DES algorithm

    Encryption/Decryption demonstration app using the S-DES algorithm. Use the Java runtime environment 11 for execution. The GUI pops up that allows entering a 10-bit encryption/decryption key in binary (0, 1 digits) and the plaintext/ciphertext in the same form (8-bit). Executing the algorithm, decription of the encoding/decoding functionality is provided in the three main text boxes.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    KISA Toolkit

    KISA Toolkit

    Korea Internet & Security Agency's Cipher Suite written in Go

    ...Cryptographic Functions: • Symmetric Encryption/Decryption • Hash Digest • CMAC (Cipher-based message authentication code) • HMAC (Hash-based message authentication code) • PBKDF2 (Password-based key derivation function 2) Copyright (c) 2020-2021 Pedro Albanese - ALBANESE Lab Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    commons-crypt

    A library for easy use of symmetric encryption and decryption in java

    A library for easy use of symmetric encryption and decryption in java. Encrypt and decrypt with one line of code using common algorithms like AES. Requires Java 7 or later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Crispy Synced Notes

    Crispy Synced Notes

    A note taking program with WebDAV sync

    ...Features: - group notes and images in a tree structure (using folders) - can work on any directory on your machine - technically works like a file browser with inline text editing - synchronizes with any WebDAV server (optionally using SSL/TLS) - allows one-way and two-way synchronization - allows to encrypt your files locally and remote using AES256 - multi language support You can obtain the full source code at: https://crispy-cow.de/git/CrispySyncNote.git Latest changes: 2.1.0: Updated for Java 9 and up 2.0.2: Added more UI translation, updated greek language (thanks to geogeo) 2.0.1: Bugfix: Sync state is now copied when duplicating workspace due to change in encryption settings
    Downloads: 4 This Week
    Last Update:
    See Project
  • 21
    Ank Zipper

    Ank Zipper

    A free and easy-to-use password protected file archiver

    Ank Zipper provides you with a lightweight, Java-based application designed to provide security to your documents. Ank Zipper can compress both files and folders and create password-protected archives, in order to prevent unauthorized access to important files. Additionally, it can be used for extracting or simply browsing ZIP files.It includes AES(Advanced Encryption Standard) algorithm to encrypt/decrypt file(s). Ank Zipper is a cross-platform software that can be used on any...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22
    Secure File Vault

    Secure File Vault

    A very secure file vault for private files to avoid hackers

    A File vault to store all of your personal items, this file vault could not be brute forced (impossible because of the hashing algorithms). It uses a combination of veracrypt, winrar, 7zip to encrypt your files to ensure that they are secure and not be seen by someone. Once you start to create the file vault, your password gets hashed a million times (only takes 3 seconds) then base 64 3 times and hashed 1 more time, it uses a combination of SHA256, SHA512 and lot of other secret...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    LoopMatcher

    LoopMatcher

    Find sequence-specific stem-loops in FASTA and GenBank files.

    LoopMatcher is a bioinformatics tool that searches for hairpin structures in cDNA / mRNA sequences (in FASTA, GenBank or Vienna format) with specific consensus sequences in the loop. It uses RNAfold to predict sequence structure and UShuffle to generate random sequences with a defined k nucleotide frequency. Also, sequences in GenBank format can be downloaded directly from NCBI using the NCBI access ID. Requirements JAVA Runtime 8. It's highly recommended to have a multicore processor...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    COHCAP

    City of Hope CpG Island Analysis Pipeline

    COHCAP (City of Hope CpG Island Analysis Pipeline, pronounced "co-cap") is an algorithm to analyze single-nucleotide resolution methylation data (Illumina 450k methylation array, targeted BS-Seq, etc.). Please note: 1) The SourceForge version of COHCAP is no longer being updated. Please see the GitHub version: https://github.com/cwarden45/COHCAP This was the source repository for the Bioconductor version, with some changes after the decision to only provide the code through...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    AES Everywhere

    AES Everywhere

    Cross Language AES 256 Encryption Library

    AES Everywhere is Cross Language Encryption Library that provides the ability to encrypt and decrypt data using a single algorithm in different programming languages and on different platforms. This is an implementation of the AES algorithm, specifically CBC mode, with 256-bit key length and PKCS7 padding. It implements OpenSSL-compatible cryptography with randomly generated salt.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB