FroZenLight interrelates line arts, mathematics, and cryptography. Circular shaped mirrors which are arranged in a grid-like manner reflect a light ray according to the reflection law of geometric optics. While random positions of the light source produce chaotic reflection patterns, it is possible to position the light source so that beautiful symmetric reflection patterns are created.

The Mobius verification environment supports the development of specifications, programs, and proofs of their security properties. It will support both source code and bytecode level verification, and be able to produce the output necessary for the generation of PCC certificates.

MonoDecrypt uses pattern matching and its knowledge about character frequencies in order to decrypt messages encoded with a monoalphabetic substitution cipher. MonoDecrypt can decrypt texts of any language, as long as it has sufficient information about the language. Depending on the information you give it, the tool decrypts about 50%-100% on its own. Then you can decrypt the remaining data by filling the gaps or correcting bad guesses. MonoDecrypt can also encrypt texts using monoalphabetic substitution.

Virtual Ideal Functionality Framework is a framework for creating efficient and secure multi-party computations (SMPC). Players, who do not trust each other, participate in a joint computation based on their private inputs. The computation is done using a cryptographic protocol which allows them to obtain a correct answer without revealing their inputs. Operations supported include addition, multiplication, and comparison, all with Shamir secret shared outputs.

Raiden is an extremely lightweight and fast block cipher, developed using genetic programming. Its aims are to be simple enough to be remembered by heart and to be compact, highly portable, and light enough to be implemented in resource constrained environments. It was developed with the intention of being an alternative to TEA, with the same speed and without any of its known weaknesses.

ACL2 is a mathematical logic, programming language, and mechanical theorem prover based on the applicative subset of Common Lisp. It is an "industrial-strength" version of the NQTHM or Boyer/Moore theorem prover, and has been used for the formal verification of commercial microprocessors, the Java Virtual Machine, interesting algorithms, and so forth.

MpNT is a multi-precision number theory library that provides a base for building cryptographic applications. It may also be used in any other domain where efficient large number computations are required. The library supports integer, modular, and floating point arithmetic with practically unlimited precision. It is both speed efficient and highly portable without disregarding code structure and clarity.

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.