Standard Algorithms Softwares

Best Softwares Encryption Algorithms Strong Encryption

1
Algorithms Visualization
Algorithms Visualization
By Evgeniy Voronyuk : Media player visualization
Program which presents the set of high quality alogirhm visualzations. Current version contains visualizations of arithmetic operations, such as: +, -, , / . Strong animation engine allows to Create new animations of any level ...
2
Sorting and Searching Algorithms
Sorting and Searching Algorithms
By : Random number
This code contains all the common sorting/searching algorithms, all with comments. The program fills an array of user specified size with random numbers, then the program executes the sorting and searching algorithms (picked at the user`s ...
3
CPU scheduling algorithms
CPU scheduling algorithms
By : Cpu temperature monitor
Simulates CPU scheduling algorithms (FCFS,SJF,SRTF,Priority, preemptive priority, and Round Robin) in this version: Fixed most of bugs, Implemented CPU idle time, All logical errors fixed (and they were many), Added two more options to the ...
4
Generic vs. Specific Algorithms
Generic vs. Specific Algorithms
By : Generic bluetooth driver usb
Two approaches to generate all Combination of elements from a number of sets. Compares "classic" statically coded algorithms to a pythonic on-the-fly generation of specific Algorithm code.
5
Relational Join Algorithms
Relational Join Algorithms
By : Join mp4 files freeware
Implements the three standard Relational join algorithms: nested loops join, hash join, and merge join, using the iterator algebra support in Python 2.4. This recipe presents code that can be used for inner join, left ...
6
rubygraph - implementation of graph algorithms
rubygraph - implementation of graph algorithms
By : Shortest path
implementation of graph algorithms including maximal flow/Minimal cut,cheapest max flow, maximal matching, strong connectivity, topological sorting, shortest path,dfs,bfs and minimal spanning tree.
7
KdaPilot - algorithms which are usually different for each search engine.
KdaPilot - algorithms which are usually different for each search engine.
By Nehuen Multimedia : Frequency analysis
Most search engines are ranking websites according to Complex formulas and algorithms which are usually different for each search engine. Also these algorithms are usually changed from time to time, for example Google
8
MhAS - It will help you simulate metaHeuristic algorithms.
MhAS - It will help you simulate metaHeuristic algorithms.
By Marcelo gaTTo : Heuristic algorithms
MhAS is an useful software that will help you simulate metaHeuristic algorithms.
9
Computational Geometry Algorithms Library
Computational Geometry Algorithms Library
By : Library archicad
The goal of the CGAL Open Source Project is to provide easy access to efficient and reliable Geometric algorithms in the form of a C++ library. CGAL is used in various areas needing geometric computation, ...
10
Genetic Algorithms Class Library
Genetic Algorithms Class Library
By Baris Taze : Visual foxpro support library
Free, Simple, Powerfull, Fully Object Oriented, C++, Extendable, Genetic Algoritms Class Library This software is "as is". I don`t get any responsibility in any case. Use it at your own risk Copyright: You can use, ...
11
LogiMod - It allows you to modify two input signals using 32 different algorithms.
LogiMod - It allows you to modify two input signals using 32 different algorithms.
By Synthedit : Math fun
The LogiMod is a simple module that allows you to modify two input signals using 32 different algorithms. There are two types of algorithms: Modes and Axiom. Modes are simple math functions like "a+b". Axioms ...
12
NumberFiles is a command-line used to research renaming algorithms
NumberFiles is a command-line used to research renaming algorithms
By Aqab Bin Talal : Graphical User Interface
NumberFiles is a command-line research project, which will be used to research renaming algorithms Currently we are working on GUI (graphical user interface) to make testing easier, we are also looking for testers
13
CrypticFile - Compress and protect your data with strong encryption algorithms
CrypticFile - Compress and protect your data with strong encryption algorithms
By GLCSoft : Windows explorer
Compress and protect your data with Strong Encryption algorithms (BLOWFISH, 3DES, GOST). Encrypt several files and Folders in single container file. Allow to Make SFX-archives and contains command prompt utility. Integrated with Windows Explorer. Help ...
14
Quick & Confidential - Password-protect your privacy with symmetric encryption algorithms.
Quick & Confidential - Password-protect your privacy with symmetric encryption algorithms.
By Gerd Steeger : Encryption algorithm
This program encrypts/decrypts your data in a very secure manner. Strong Encryption is given by a key size of 256 bits. The users more or less secure password phrase is hashed by SHA256 into a ...
15
LetEncrypt - Encrypt your text files with unlimited high levels of encryption algorithms.
LetEncrypt - Encrypt your text files with unlimited high levels of encryption algorithms.
By InfraDrive : Encrypt
Encrypt your text files with unlimited high levels of encryption algorithms. - LetEncrypt shows you the level of encryption through a security meter.- Encrypt your text file by using unlimited ways.- Import/Export your encryption settings.- ...


Encrypt Your Encryption Algorithms Encrypt Your Text

1
DevSolutions Crypt
DevSolutions Crypt
By DevSolutions : Windows developer
DevSolutionsCrypt library is a powerful and easy to use cryptographic ActiveX and DLL component for Windows developers that allows applications to encrypt/decrypt data or files using the latest industry standard strong encryption algorithms.It can be ...
2
Netlab
Netlab
By : Data analysis
The Netlab toolbox is designed to provide the central tools necessary for the simulation of theoretically well founded neural network algorithms and related models for use in teaching, research and applications development. It contains many ...
3
cGeep Pro
cGeep Pro
By 2008 SafeLogic : Privacy Protection
A high level of security and privacy which has become a de Facto standard cGeep Pro is an implementation of the OpenPGP standard, based upon PGP (Pretty Good Privacy) created by Phil Zimmermann in 1991. ...
4
FileBarricader 2004
FileBarricader 2004
By MySoCo : FileBarricader
FileBarricader puts up a Barricade Between your files and any unauthorized person, program, or entity. You encrypt your files using the latest industry standard Cryptography algorithms, and only people who know the password will have ...
5
Evolutionary Computing IDE
Evolutionary Computing IDE
By Alexander Prokopec : Javascript ide
An IDE written in Java used to develop, visualize, test and Benchmark evolutionary algorithms. The IDE is fully modular, allowing new algorithms to be added as plugins. It can be used to develop other algorithms ...
6
addCRYPT Encryption & Hash Components
addCRYPT Encryption & Hash Components
By LittleBIGware : Visual basic
The addCRYPT Encryption & Hash Components provide Strong Encryption, fast hashing and compression algorithms in both ActiveX and DLL components. Uses open standard algorithms that includes Blowfish (for encryption) and RIPEMD160 (for hashing), all verifed ...
7
HsCipherSDK Encryption Library
HsCipherSDK Encryption Library
By Hillstone Software : Visual basic
HsCipherSDK is an Encryption Library providing an API to a suite of symmetric key cryptographic algorithms and one way hash digital signature algorithms. The library includes the following block and stream Cipher modules: AES (Advanced ...
8
MOEA Framework
MOEA Framework
By D. Hadka : Framework 2.0
The MOEA Framework is an open source Java library for developing and experimenting with multiobjective evolutionary algorithms (MOEAs) and other general-purpose multiobjective optimization algorithms. A number of algorithms are provided out-of-the-Box, including NSGA-II, -MOEA, GDE3 ...
9
KANAL
KANAL
By PEiD : Kanal d oyun com.tr
This plugin searches for known crypto algorithms inside of the specified module. Notes: 1. The detection is limited to crypto that`s possible to identify by a specific signature (such as fixed s-boxes, permutation tables, initialization ...
10
Java Machine Learning Library
Java Machine Learning Library
By Thomas Abeel : Java
Java Machine Learning Library is a library of machine learning algorithms and related datasets. Machine learning techniques include: clustering, classification, feature selection, regression, data pre-processing, ensemble learning, voting. Java-ML in a Nutshell: A collection of ...
11
Evolving Objects
Evolving Objects
By Marc Schoenauer : About business objects
EO is a Template-based, ANSI-C++ evolutionary computation library which helps you to write your own stochastic optimization algorithms insanely fast. Evolutionary algorithms forms a family of algorithms inspired by the theory of evolution, that solve various ...
12
Free Noise Reduction Plug-in
Free Noise Reduction Plug-in
By Softwhile : Acrobat plug-in
Electronic noise is a FACT of life in digital imaging. Often this noise is insignificant, but sometimes it can ruin an otherwise fine image. softwhile`s DeNoise plug-in provides additional noise reduction algorithms for Adobe`s Photoshop, ...
13
Prohash
Prohash
By Machinescript, Inc. : Vlc for e71
It is probably the best home CheckSum calculator ever. Computes hash values of strings & files. Supports 39 algorithms including SHA-512. Easy to use & extremely fast, especially when it comes to really big files. ...
14
JHashDigester
JHashDigester
By DiceLock Security : Java software
JHashDigester is a Free Java software library implementing hash algorithms. The hash algorithms are implemented as classes in the DiceLockSecurity Namespace. JHashDigester contains the Java extension (.jar) library file to Link to. You will be ...
15
StealthDisk
StealthDisk
By Security Group Six : Virtual disk
StealthDisk Mobile uses Virtual Disk Technology to easily and securely store all your important files and documents. Using industry-leading encryption algorithms, StealthDisk Mobile creates an encrypted virtual disk that encrypts and decrypts all data on-the-fly ...

Encrypt Your Encryption Algorithms Encrypt Your Text