Browse free open source C Encryption Algorithms and projects below. Use the toggles on the left to filter open source C Encryption Algorithms by OS, license, language, programming language, and project status.

  • Agentic AI SRE built for Engineering and DevOps teams. Icon
    Agentic AI SRE built for Engineering and DevOps teams.

    No More Time Lost to Troubleshooting

    NeuBird AI's agentic AI SRE delivers autonomous incident resolution, helping team cut MTTR up to 90% and reclaim engineering hours lost to troubleshooting.
    Learn More
  • The AI workplace management platform Icon
    The AI workplace management platform

    Plan smart spaces, connect teams, manage assets, and get insights with the leading AI-powered operating system for the built world.

    By combining AI workflows, predictive intelligence, and automated insights, OfficeSpace gives leaders a complete view of how their spaces are used and how people work. Facilities, IT, HR, and Real Estate teams use OfficeSpace to optimize space utilization, enhance employee experience, and reduce portfolio costs with precision.
    Learn More
  • 1
    Advanced Onion Router
    Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and actions more accessible, local banlist for forbidden addresses, private identity isolation, a point-and-click process interceptor that can redirect connections from programs that don't support proxies, also giving them fake information about the local system and support for .onion addresses. Also, it can estimate AS paths for all circuits and prevent AS path intersections, it can restrict circuits to be built using only nodes from different countries, can change circuit lengths and more.
    Leader badge
    Downloads: 138 This Week
    Last Update:
    See Project
  • 2
    sha is a file hashing utility that uses the NIST's SHA-1, SHA-256, SHA-384, & SHA-512 hash algorithms. It can be used for file integrity checking, remote file comparisons, etc. The portable algorithm implementations can be useful in other projects too.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Use of Michael Rabin's Information Dispersal Algorithm to provide secure, dispersed storage in a networked environment. For full download, please get both Math-FastGF2 and Crypt-IDA releases under the files link. See project wiki for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Serpent_in_CBC_mode_for_MCUs

    Serpent_in_CBC_mode_for_MCUs

    Open-source code that enables you to use Serpent in CBC mode

    Serpent_in_CBC_mode_for_microcontrollers is an open-source code that enables you to easily integrate the Serpent encryption algorithm in CBC mode to your project. Based on the work of https://github.com/peterferrie/serpent GitHub Page: https://github.com/Northstrix/Serpent_in_CBC_mode_for_microcontrollers
    Downloads: 0 This Week
    Last Update:
    See Project
  • Securden Privileged Account Manager Icon
    Securden Privileged Account Manager

    Unified Privileged Access Management

    Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.
    Learn More
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB