Search Results

We have found 80 items matching your search query.

fallback-no-image-2247

Openswan

An IPsec implementation for Linux.
fallback-no-image-2445

aes

An AES encrypt/decrypt gem for Ruby built on top of OpenSSL.
fallback-no-image-2910

VSTextHash

VSTextHash is a cryptographic hash generation software.
fallback-no-image-2285

Certificate Less Authenticated Encryption (CLAE)

A schema that adds authentication to Identity Based Encryption (IBE). Claims advantages are adding authenticity and confidentiality to every message, simplifies key management and end-to-end security
fallback-no-image-2619

SecureLogin

SecureLogin is a decentralized authentication protocol for websites and apps. It is an all-in-one solution that creates a cryptographic private key from your email and master password to sign in every
fallback-no-image-2095

Milagro

Milagro is an open source, pairing-based cryptographic platform that delivers solutions for device and end user authentication, secure communications and fintech / blockchain security. It does this wi
fallback-no-image-2323

CipherPoint Eclipse Data Security API

Allows software and application developers to quickly and easily integrate layered data security capabilities such as data encryption, automated key management, permissions management, and activity l
fallback-no-image-2739

TweetNaCl

An open source auditable high-security cryptographic library. TweetNaCl fits into just 100 tweets while supporting all 25 of the C NaCl functions used by applications. TweetNaCl is a self-contained pu
fallback-no-image-2249

Orchid

A Tor client implementation and library written in pure Java. It was written from the Tor specification documents. It runs on Java 5+ and the Android devices.
fallback-no-image-2454

NanoCrypto

A cryptographic engine purpose built for resource-constrained embedded systems environments. Features support for over 35 operating systems, cryptographic methods including RSA and elliptic curve, sym
fallback-no-image-2914

Autocrypt

Autocrypt is a set of open source guidelines for developers to achieve convenient end-to-end-encryption of e-mails. It specifies how e-mail programs negotiate encryption capabilities using regular e-m
fallback-no-image-2287

RaspTor

Implements a Wi-Fi router and a TOR Proxy on a Raspberry Pi.