RSS 28 projects tagged "Cryptography"

Download Website Updated 07 Nov 2003 Better ASN

Screenshot
Pop 17.55
Vit 61.81

Better ASN is a Java ASN.1 API that focuses on speed and efficiency rather than extended functionality. This strategy prescribes one-pass decoding and near 100% encoding efficiency for typical ASN.1 usage patterns. Although BASN was developed for use by a Certificate Authority, the release comes packaged with an ASN.1 to Java compiler, which can be used to generate Java implementations of ASN.1 structures. This allows the API to be used for any Java application that may require ASN.1 decoding/manipulation/encoding.

No download Website Updated 18 Dec 2004 MpNT

Screenshot
Pop 19.05
Vit 58.43

MpNT is a multi-precision number theory library that provides a base for building cryptographic applications. It may also be used in any other domain where efficient large number computations are required. The library supports integer, modular, and floating point arithmetic with practically unlimited precision. It is both speed efficient and highly portable without disregarding code structure and clarity.

No download Website Updated 18 Oct 2006 Raiden

Screenshot
Pop 11.66
Vit 52.39

Raiden is an extremely lightweight and fast block cipher, developed using genetic programming. Its aims are to be simple enough to be remembered by heart and to be compact, highly portable, and light enough to be implemented in resource constrained environments. It was developed with the intention of being an alternative to TEA, with the same speed and without any of its known weaknesses.

Download Website Updated 16 Jan 2009 Mobius Program Verification Environment

Screenshot
Pop 27.13
Vit 43.86

The Mobius verification environment supports the development of specifications, programs, and proofs of their security properties. It will support both source code and bytecode level verification, and be able to produce the output necessary for the generation of PCC certificates.

Download Website Updated 20 Feb 2011 C++ Elliptic Curve Cryptography library

Screenshot
Pop 126.81
Vit 7.70

Libecc is a C++ elliptic curve cryptography library that supports fixed-size keys for maximum speed. The goal of this project is to become the first free Open Source library providing the means to generate safe elliptic curves, and to provide an important source of information for anyone with general interest in ECC.

Download Website Updated 30 Sep 2009 Bit::Vector

Screenshot
Pop 182.10
Vit 7.24

Bit::Vector is a (stand-alone) C library and an object-oriented Perl module (with overloaded operators) which allows you to handle bit vectors, sets (of integers), "big integer arithmetic" (e.g. for cryptography), and boolean matrices (all of arbitrary size) very efficiently.

Download No website Updated 04 Jun 2008 alph

Screenshot
Pop 84.43
Vit 6.14

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Download Website Updated 11 Apr 2011 ACL2

Screenshot
Pop 74.19
Vit 4.96

ACL2 is a mathematical logic, programming language, and mechanical theorem prover based on the applicative subset of Common Lisp. It is an "industrial-strength" version of the NQTHM or Boyer/Moore theorem prover, and has been used for the formal verification of commercial microprocessors, the Java Virtual Machine, interesting algorithms, and so forth.

Download Website Updated 14 Dec 2009 Virtual Ideal Functionality Framework

Screenshot
Pop 40.99
Vit 3.87

Virtual Ideal Functionality Framework is a framework for creating efficient and secure multi-party computations (SMPC). Players, who do not trust each other, participate in a joint computation based on their private inputs. The computation is done using a cryptographic protocol which allows them to obtain a correct answer without revealing their inputs. Operations supported include addition, multiplication, and comparison, all with Shamir secret shared outputs.

Download Website Updated 26 Oct 2002 OpenAI

Screenshot
Pop 114.56
Vit 2.93

The OpenAI site is centered around an Open Source project and community involving artificial intelligence. The project itself is the creation of a set of tools that are considered to be models of human intelligence or biomimicry. These tools are intended to be integrated into applications or used stand alone for research.

Screenshot

Project Spotlight

MOSIX

A cluster operating system.

Screenshot

Project Spotlight

Univention Corporate Server

A server operating system with an integrated identity and infrastructure management system.