BeeCrypt is an ongoing project to provide strong and fast cryptography in the form of a toolkit usable by commercial and open source projects. Included in the library are entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.
CDSA stands for Common Data Security Architecture. It provides a security framework that includes cryptographically signed modules to present an abstracted unified API to the application developer to perform cryptographic and security related operations. It also includes hardware support for cryptographic tokens and biometric devices, such as thumbprint scanners. Intel has implemented the CDSA 2 specification and released it as open source.
Keep in Touch aims to be a secure IM system for multiple platforms. It supports its own XML-based protocol as well as ICQ and AIM (toc). It provides encrypted connections between the server and client aswell as encrypted chat on all supported networks. The client can store contacts on the server allowing users to keep their contact lists between different locations.
P-Synch is a commercial password management toolkit which provides automated password synchronization, password strength enforcement, password self-reset by authenticated users, and streamlined password reset by helpdesk. P-Synch is available for both internal use as well as for Internet-based deployments in B2B and B2C applications.
PLIB is a set of libraries to write games and other realtime interactive applications that are 100% portable across a wide range of hardware and operating systems. It's used by Majik3D, FlightGear, and others, and includes libraries for GUI widgets, sound replay, geometry, scene graph, joystick, and fonts/text.
Botan is a crypto library written in C++. It provides a variety of cryptographic algorithms, including common ones such as AES, MD5, SHA, HMAC, RSA, Diffie-Hellman, DSA, and ECDSA, as well as many others that are more obscure or specialized. It also offers SSL/TLS (client and server), X.509v3 certificates and CRLs, and PKCS #10 certificate requests. A message processing system that uses a filter/pipeline metaphor allows for many common cryptographic tasks to be completed with just a few lines of code. Assembly and SIMD optimizations for common CPUs offers speedups for critical algorithms like AES and SHA-1.
The Peer-to-Peer Trusted Library (PtPTL) is a software security toolkit tailored for the creation of peer-to-peer applications. It allows for the establishment of trust between individual peer-to-peer clients and the organization of secure groups of trusted peers. Ultimately, the PtPTL allows users to share information and collaborate securely across the Internet.