Cryptography scripts download

[

cryptography script overview « 1 - 30 » of 44 scripts

]
«« « 12 » »»
336 336

... This class can encrypt and decrypt data using the XOR ... binary operation.An encryption password text is combined with the data being encrypted ... random input vector using the XOR binary operation. The encrypted result is return encoded with ... the base64 algorithm.The class can also decrypt data using the same encryption password by applying the ...

... binary format photo.The shares and the overlapping result of the shares are written as output. ... can be printed in separate transparent sheets and overlapping them reveals the secret image. Demands ...

... collection of cryptographic algorithms and protocols, implemented for use from Python. Among the contents ... Block encryption algorithms ... AES, ARC2, Blowfish, CAST, DES, Triple-DES, IDEA, RC5. ... Stream encryption algorithms ...

... simple codes for implementing the most rudimentary encryption method possible. CRYPTOSHIFT.m implements ... monoalphabetic shifting substitution encryption. It takes two arguements ... the string to be encoded and the amount to shift each letter. To decode, shift backward ...

... Simple Cryptography Services provides simple to use cryptographic services.Simple Cryptography Services provides simple to use cryptographic services. ...

... of popular encryption algorithms. Algorithms currently include Blowfish, GOST, IDEA, and Rijndael ... CBC has also been implemented.The Crypt library is ... of popular encryption algorithms. Algorithms currently include Blowfish, GOST, IDEA, and Rijndael ...

... ASP.NET and Mobile applications, who wants to protect sensitive data or even files with powerful password protection. ... Crypt is small, fast, multiplatform, low cost, intuitive and extremely ... your working time to code, test and debug cryptography. Crypt can do it for you on ...

... royalty-free ActiveX component for use in your security-sensitive Windows applications and ... validate data integrity. It supports the latest cryptographic standards and technology including up to 256-bit Advanced Encryption ... Standard (AES), 2048-bit RSA public-key cryptography, and digital signature creation ...

... modular and extensible collection of cryptography functions, for encryption and hashing. Includes Blowfish, MD5, SHA functions, XXTEA, ... and others, all coded from easy-to-read and object-oriented JavaScript code. ...

... This class can be used to hide encrypted data in images using steganography which is the art ... and science of writing hidden messages in such ... intended recipient knows of the existence of the message. It reads ... given image in GIF, JPEG or PNG formats, encrypts data supplied by the user ...

... to quickly build web shops and sell their products online. Most important functions of Satchmo ... items are driven by templates using the powerful Django templating language ... Purchase ordersShipping Options ... UPS integration• Fedex integration ...

... Gale is instant messaging software distributed under the terms of the GNU ... General Public License. Instant messaging software allows users to communicate with each other ... matter of seconds. Examples of other instant messaging systems include the MIT Zephyr system, Internet Relay Chat, ...

... Libecc is an Elliptic Curve Cryptography ... of this project is to become the first free Open Source library providing the means to generate ... safe elliptic curves. ...

... to quickly and securely encrypt any type of data to protect not only your intellectual property,but also ... sensitive information such as database passwords and functionality. Encrypting your sensitive information is ... no longer an expensive or painful task. Encrypt4Web uses ...

... Java implementation of Vigenere's algorithm for cryptography. At this time it works within ... Java applet (JaVi2Applet.java). It ... built using the Java AWT and it should work on almost any ... browser. The first gray panel on top contains information about the version, the ... copyright and the license. The left panel gives an evaluation of the key strength, printing ...

... security into your Internet applications! IP ... Shell includes SSH-enabled client communications components supporting strong encryption and advanced cryptography.Fully-managed .NET components based ... Extensive demo applications for Winforms and WebForms ... Support for x-copy deployment in ASP.NET. ...

... The PHTML Encoder allows encoding PHP scripts before distributing them. The script code logic is ... preserved while using cryptography to hide your logic from prying eyes. It ... is possible to lock encoded scripts to predefined machine ... via machine ID so your scripts will work only on this machine. You can use self-decodable ...

... The algorithms are AES, SHA-1, BASE64, RSA, ECC, HMAC and ... can be found here. Most important functions of jscrypto:Complete list of supported algorithms ... Public key cryptography ... you can extend the framework with your own algorithms.• Support Init, Upate, Final pattern for bulk data ...

... simple cryptography system. Limitations ... 65-90 and 97-122. News in the current crypt-rot13 version:• Fixed ... packaging bug.• Added the ... Some documentation updates. ...

... Project Control System (PCS) is ... powerful, sophisticated, yet easy-to-use project management tool designed to provide clear real-time information on ... and relied upon by experts and tech developers, PCS allows you to understand the deployment of people, ... algorithms used on passwords to ensure accounts are secure PCS uses the md5 encryption algorithm which has ...

... course in Number Theory and Cryptography by Neal KoblitzHere, we find the factors of ... In this file, we have considered those ... which happen to be FPN. So, after dividing ... we call the routine find_Primes_1__mod_2n_mod_n.m to find the other factors.Q-5a-FPN ... have at the most just ONE FPN as ...

... Demonstrates using 'OpenSSL for Ruby ... by Michal Rokos for asymmetric key cryptography. ...

... component that brings security to your application through encryption. With AspEncrypt, you can encrypt data, send ... MIME-based secure mail, compute one-way hash values, generate and verify ... digital signatures, issue and manage X.509 digital certificates, and more. This component can be used ...

... encrypt or decrypt variants, BLOB data or files. ABCCrypto uses the standard Windows Cryptography API to ensure ... practical level of security throughout virtually any country in the world. Because ... English to Arabic to Korean. You can use ABCCrypto from ASP, Visual Basic or any scripting language ... the Microsoft ActiveX Scripting interfaces. These include VBScript (Visual Basic Scripting Edition ...

... inside the download package.It can be used in security systems, cryptography, text management and much more.The user ... of characters can be used.Most important functions of Randomizer:• Strong password creator, strength up to 100bit and ... Web 2.0 look and feel.• Cross-browser, tested and works with IE 7, Opera ... OOP JavaScript.• Unit tests.Demands ...

... Simple text hash: sha ... This returns an array of ... 32-bit integers. The SHA.hash_bytes function does the same thing, but requires an ... bits. There are also some hash to string conversion functions. The naming convention admittedly ...

... strong and fast cryptography toolkit. It includes entropy sources, random generators, block ... ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives. ...

... Standard function which could find the GCD for complex numbers. CMPLX ... GCD.m mainly to solve some Exercise problems of I.2, specially Problem 15, in Pages ... course in Number Theory and Cryptography by Neal Koblitza and ... are input complex vectors of the same size, whose GCD is ...

... integrity, and correctness.It runs on all major operating systems, including Windows, Linux and other UNIX systmes like ... INTEGER, NUMERIC, CHAR, VARCHAR, DATE, INTERVAL, BOOLEAN and TIMESTAMP.PostgreSQL also supports storage of binary large objects, including ... Perl, Python, Tcl, ODBC, among others, and exceptional documentation.PostgreSQL runs stored procedures in more than ...

... This package can be used to hide encrypted data in images using steganography. It reads ... given image in GIF, JPEG or PNG formats, encrypts data supplied by the user ... and hides the encrypted data in the image by making subtle colour changes to certain pixels ... to store the data in the image symbolically. The resulting image is generated in PNG ...

Scripting cryptography programming is written in computer programming languages that is typically interpreted and can be typed directly from a keyboard. Cryptography scripts are often distinguished from executable files. This cryptography scripts are safe to use virus free and spyware free.

«« « 12 » »»