Software Downloads for "Algorithm Cryptography"

RSA.rb is a pure-Ruby implementation of the RSA encryption algorithm and the PKCS#1 cryptography standard..

  • Platform: Ruby, Scripts
  • Publisher: Arto Bendiken
  • Date: 23-03-2013
  • Size: 10 KB

CryptoLab is a freeware cryptography application for Microsoft Windows, and incorporates text-based encryption / decryption through the use of plug-in cipher modules. Advanced features include SMTP email support, a Key Manager and pseudo-random key generation. Features list: Plug-in cipher modules. Advanced pseudo-random key generation. Easy-to-use tabbed interface for text files. Key Manager storage utility. Full password protection (incorporating SHA-1 hashing algorithm). Integrated SMTP email support.

We are proud to present you our unique image comparison algorithm implemented as standalone dll file. It has only one exported function with two bitmap pointers in and similarity percentage out. Can work with many programming languages including Delphi, Visual C++, C#, VB and VB.NET. We can also provide you with the modified DLL. It can precalculate image hash (768 bytes) and you can use these hashes for comparison then. You can check our comparison algorithm with help of our Image Comparer tool.

  • Platform: Tablets, Windows
  • Publisher: Bolide Software
  • Date: 12-11-2007
  • Size: 136 KB

Datum Locker allows the record keeping of account credentials and note taking which are deemed sensitive. Its strength comes from the use of an undocumented mathematically sound cryptographic algorithm to store your data on disk in addition to presenting an intruder with random semantics for the omittance of a valid key. Datum Locker operates on a timer monitoring when the application becomes idle, such a time will result in the application locking'n'docking onto the system tray. Datum Locker allows you to juggle your workstation notes and login accounts safely as behind the scenes a lock exists on this data using cryptography as it is fundamentally for your eyes only.

  • Platform: Windows
  • Publisher: Nullox
  • Date: 08-07-2010
  • Size: 522 KB

[Home & Help] http://embeddedsw.net/MultiObfuscator_Cryptography_Home.html

MultiObfuscator is a professional cryptography tool

- HW seeded random number generator (CSPRNG)
- Deniable cryptography
- Up to 256Mb of secret file (binary mode)
- Up to 256Kb of secret text (text/email mode)
- Whitening selection level
- Modern multi-cryptography (16 algorithms)
- Multi-layered data obfuscation (4 passwords)
- X-square steganalysis resistance

Unique layers of security and obfuscation

- 256bit+256bit symmetric-key cryptography with KDF4 password extension
- 256bit symmetric-key data scrambling (CSPRNG-based shuffling)
- 256bit symmetric-key data whitening (CSPRNG-based noise mixing)
- Adaptive X-square correction

MultiObfuscator is a portable/stealth software

- Native...

The algorithm is designed to transfer an encryption key between two parts electronically in a hidden fashion. This free test script simulate such an exchange beween two parts. It is written for the best owerview and understanding possible..

  • Platform: JavaScript, Scripts
  • Publisher: karelma.com
  • Date: 04-07-2011
  • JFish
  • License: Freeware
  • Rating

JFish is a simple Java implementation of the popular Twofish cryptography algorithm. It allows any application to easily implement powerful encryption, using a single small library and minimal code changes..

JRijndael is a 100% pure Java implementation of the popular Rijndael (aka AES) cryptography algorithm. It's designed to be implemented as easily as possible and features ECB, padding, and a simple API..

JSerpent is an easy to use Java implementation of the powerful Serpent cryptography algorithm. It can be easily implemented into any project, and is complete with ECB, padding, and a simple API..

This is a simple implementation of the famous LZW algorithm..

  • Platform: Matlab, Scripts
  • Publisher: Giuseppe Ridino
  • Date: 12-01-2013
  • Size: 31 KB

this algorithm predicts the received signal strength for the mobile user to avoid fluctuation in received signal strength during localization of the mobile user(finding mobile user's location).

  • Platform: Matlab, Scripts
  • Publisher: Bachan P
  • Date: 03-03-2013
  • Size: 10 KB

NSGA-II is a very famous multi-objective optimization algorithm. I submitted an example previously and wanted to make this submission useful to others by creating it as a function. Even though this function is very specific to benchmark problems, with a little bit more modification this can be adopted for any multi-objective optimization. The function is nsga_2(pop,gen). The input arguments for the function are population size and number of generations. For customization purposes the user is free to modify the objective function (function of several decision variables) by modifying an m file (evaluate_objective.

  • Platform: Matlab, Scripts
  • Publisher: Aravind Seshadri
  • Date: 13-04-2013
  • Size: 10 KB

Gravitational search algorithm (GSA) is an optimization algorithm based on the law of gravity and mass interactions.This algorithm is based on the Newtonian gravity: "Every particle in the universe attracts every other particle with a force that is directly proportional to the product of their masses and inversely proportional to the square of the distance between them"..

  • Platform: Matlab, Scripts
  • Publisher: Esmat Rashedi
  • Date: 07-04-2013
  • Size: 10 KB

The Jonker-Volgenant algorithm is much faster than the famous Hungarian algorithm for the Linear Assignment Problem (LAP). This Matlab implementation is modified from the original C++ code made by Roy Jonker, one of the inventors of the algorithm. It is about 10 times faster than the munkres code (v2.2) of the author. It can solve a 1000 x 1000 problem in about 3 seconds in a normal Intel Centrino processor. V1.1 returns the dual variables and the reduced cost matrix as well. V1.2 can deal with nonsquare assignment problems.

  • Platform: Matlab, Scripts
  • Publisher: Yi Cao
  • Date: 15-03-2013
  • Size: 10 KB

A flexible implementation of PSO algorithm with time-varying parameters. Algorithm is suitable for solving continuous optimization problems. Special care has been taken to enable flexibility of the algorthm with respect to its parameters and to initial population selection. Detailed logging of the algorithm performance during the search is also enabled..

  • Platform: Matlab, Scripts
  • Publisher: Milan Rapa
  • Date: 24-02-2013
  • Size: 10 KB

findMIS is an heuristic algorithm for solving Maximum Independent Set problem (MIS). An independent set of a graph is a subset of vertices in which no two vertices are adjacent. Given a set of vertices, the maximum independent set problem calls for finding the independent set of maximum cardinality. Algorithm run in O(n^2) time, where n is the number of vertices (worst case). Experimentally: time = 8.1e-007*n^2 + 2.2e-005*n + 0.00012 seconds, (see screenshot) The algorithm has been independently developped but is similar to: Balaji, Swaminathan, Kannan, "A Simple Algorithm to Optimize Maximum Independent Set", Advanced Modeling and Optimization, Volume 12, Number 1, 2010 Notation: The neighborhood of v is defined by N(v) ={u in V such that u is adjacent to v} The DEGREE of a vertex v in V, denoted by deg(v) and is defined by the...

  • Platform: Matlab, Scripts
  • Publisher: Roberto Olmi
  • Date: 24-06-2013
  • Size: 10 KB

We use the genetic algorithm (gatool) to determine the four parameters of the implicit Forst-Kalkwarf-Thodos Model. Predictions are in perfect agreement with data of vapour pressure of iodobenzene versus temperature for a temperature range from 380.15 K to 580.15 K..

  • Platform: Matlab, Scripts
  • Publisher: Housam Binous
  • Date: 07-01-2013
  • Size: 10 KB

This is an extremely fast implementation of the famous Hungarian algorithm (aslo known as Munkres' algorithm). The new version (V2.2)is about 1.5 times faster than the old version (V2.1). It can solve a 1000 x 1000 problem in about 20 seconds in a Core Duo (T2500 @ 2.00GHz) XP laptop with Matlab 2008a, which is about 2.5 times faster than the mex code "assignmentoptimal" in FEX ID 6543, about 6 times faster than the author's first version in FEX ID 20328, and at least 30 times faster than other Matlab implementations in the FEX.

  • Platform: Matlab, Scripts
  • Publisher: Yi Cao
  • Date: 01-01-2013
  • Size: 10 KB

This matlab function computes the dft of a set of values and returns the dft coefficients. This is a three butterfly radix-2 algorithm..

genetic algorithm (or GA) is a search technique used in computing to find true or approximate solutions to optimization and search problems for function of 2 variable.

New Reviews


Apple Aperture

It is quite true that Macintosh users generally get fewer tools to pick from than Windows users but they have some solid and impressive software to work with. One such example is Apple’s professional image editing and organizing tool, ...


Avast Endpoint Protection Suite Plus

PC security has become a vital aspect of computing nowadays and business users face the heat more than home users. While installing and handling a standalone antivirus suite is neither tedious nor time consuming, the scenario is different in ...


Avid Media Composer

When it comes to professional level video editing, there are plenty of tools available for computer users nowadays. While a lot of studio professionals swear by apps like Adobe’s powerhouse software Premiere Pro and Mac users stick to Final ...


Apple iMovie

For higher end video editing and post production related needs on Mac OS, the preferred choice is FCP in most instances. However, not all Mac users need to deal with a feature laden, sophisticated editor for casual needs. For casual to moderate ...


Style Jukebox

No matter if you use a computer for personal needs or work in a networked setup, listening to music is commonplace. It is required for relaxation amidst work and nearly every user indulges in it. For music playback on PC, the WMP is not the only ...


Sigma Internet Monitoring

There is no denying the huge importance of internet in human life. Without the web, it has literally become imposable to carry on a lot of personal and professional activities, irrespective of your age, gender and qualification. While the web serves ...


NovaBench

PC performance benchmarking is something that may not interest average users much but tech savvy lot resort to such apps to find out prowess and capability of their laptops and desktops. While there are quite a few PC benchmarking apps in market, ...


Magic Uneraser

Data loss can occur owing to a number of reasons, both within and beyond your control. Whether you have lost data owing to careless of another user or a hard drive failure has occurred, it is important to retrieve the data at any cost. There are so ...


Freemake Video Converter

Video conversion can become a necessity for average PC users who find it increasingly hard to manage an ever growing collection of media and video files. The DVDs, videos obtained from web and clips shot with mobile devices keep growing. Over time, ...


Comodo Unite

There are many ways to bypass the restrictions imposed on users by governments and ISPs for accessing specific websites and online services. One of them is using a capable VPN application. A VPN app basically lets you camouflage the real IP address ...


New Downloads

LanInspector 8 Enterprise
Free

Inventory of software and
hardware in your network. No
matter if you decide to set up
a complete Software Asset ...

CaptionsMadeEasy
CaptionViewer

CaptionsMadeEasy CaptionViewer
- Easy Caption Editor &
Slideshow Viewer.
CaptionViewer easily adds
captions to your ...

Ghost Mouse Auto Clicker

Ghost Mouse Auto Clicker is a
keyboard and mouse recorder
tool used to record mouse
movements, mouse clicks,
keystroke ...

Database Browser Portable

This Easy to use tool allows
user to connect to any
database and browse or modify
data ,run sql scripts, export
and print ...

LanInspector 8 Professional
Free

Inventory of software and
hardware in your network. No
matter if you decide to set up
a complete Software Asset ...

Auslogics Registry Cleaner

Cluttered and corrupted
Windows Registry leads to
various system errors,
crashes, and failures.
Auslogics Registry ...

Tagman

Tagman just needs one click to
add titles, artists, albums
and more to the id3 tag of
your mp3 files. These are read
by ...

Virtual Serial Port Driver

Virtual Serial Port Driver by
Eltima creates virtual COM
port pairs in the system.
Using these ports serial
applications ...

KeyText

Keyboard macro program with
multiple clipboard and Windows
automation features. Stores
texts for typing or pasting
into ...

ECTmorse

ECTmorse is a program designed
to help sufferers of paralysis
by allowing them to type using
Morse code. The program may
...