Results for: genetic cryptography

Suggested Categories:

Post-Quantum Cryptography (PQC) Software
Post-quantum cryptography (PQC) software refers to cryptographic systems and algorithms designed to secure data against the potential future threat posed by quantum computers. Traditional cryptographic methods, such as RSA and ECC (Elliptic Curve Cryptography), rely on the difficulty of certain mathematical problems that could be solved efficiently by a sufficiently powerful quantum computer. Post-quantum cryptography focuses on developing new cryptographic protocols that are resistant to quantum computing threats, utilizing algorithms based on lattice-based, hash-based, multivariate, or code-based cryptography. This software ensures that data remains secure even in the era of quantum computing, offering a bridge between today's cryptographic practices and the future landscape of quantum-enhanced threats.
Encryption Software
Encryption software protects sensitive data by converting it into unreadable code that can only be accessed with the correct decryption key. It secures files, communications, applications, and entire systems from unauthorized access, cyberattacks, and data breaches. These tools use algorithms like AES, RSA, and elliptic-curve cryptography to safeguard data at rest, in transit, or in use. Many encryption platforms offer key management, user authentication, and compliance features to meet industry regulations and enterprise security requirements. Overall, encryption software is essential for maintaining privacy, ensuring data integrity, and protecting information across digital environments.

30 Products for "genetic cryptography" with 1 filter applied:

  • 1
    CLEAR

    CLEAR

    Quantum Knight

    ...It can be deployed online or offline and works on more than 30 types of modern operating systems and embedded equipment. Designed for maximum efficiency and simplicity, CLEAR can dramatically reduce energy usage at scale, relative to other legacy cryptography.
    Starting Price: Free
    View Software
    Visit Website
  • 2
    cryptography

    cryptography

    cryptography

    cryptography includes both high-level recipes and low-level interfaces to common cryptographic algorithms such as symmetric ciphers, message digests, and key derivation functions. Encrypt with cryptography’s high-level symmetric encryption recipe. cryptography is broadly divided into two levels. One with safe cryptographic recipes that require little to no configuration choices.
    Starting Price: Free
  • 3
    Apex LIS

    Apex LIS

    Apex Healthware, LLC

    ...HIPAA-compliant Phone app supports patient registration, test order and results notification. We have more than 300 deployments with clients specializing in: Fertility, Genetic testing, molecular testing, Pathology, Toxicology and virtually all other specialties. We have interfaced over 250 different analyzers including interfaces to the leading analyzers in the fields of molecular biology and genetic testing.
    Starting Price: $1500 one-time payment
  • 4
    OpenSSL

    OpenSSL

    OpenSSL

    OpenSSL is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library. OpenSSL is licensed under an Apache-style license, which basically means that you are free to get and use it for commercial and non-commercial purposes subject to some simple license conditions. For more information about the team and community around the project, or to start making your own contributions, start with the community page. ...
  • 5
    american fuzzy lop
    American fuzzy lop is a security-oriented fuzzer that employs a novel type of compile-time instrumentation and genetic algorithms to automatically discover clean, interesting test cases that trigger new internal states in the targeted binary. This substantially improves the functional coverage for the fuzzed code. The compact synthesized corpora produced by the tool are also useful for seeding other, more labor or resource-intensive testing regimes down the road.
    Starting Price: Free
  • 6
    PryvateNow

    PryvateNow

    PryvateNow

    PryvateNow is a comprehensive communication platform that encrypts and secures voice and video calls, instant messages, emails, and conference calls, both on and off the network. It offers solutions tailored for small and medium-sized enterprises, corporate entities, and large enterprises, ensuring full control over communications and data. Key features include Post-Quantum ZRTP encryption for world-leading data security, built-in auditing and compliance aligning with MiFID II, HIPAA, and...
    Starting Price: $1.25 per month
  • 7
    OmicsBox

    OmicsBox

    BioBam Bioinformatics S.L.

    OmicsBox is a leading bioinformatics solution that offers end-to-end data analysis of genomes, transcriptomes, metagenomes, and genetic variation studies. The application is used by top private and public research institutions worldwide and allows researchers to easily process large and complex data sets, and streamline their analysis process. It is designed to be user-friendly, efficient, and with a powerful set of tools to extract biological insights from omics data.
    Starting Price: €100/month/seat
  • 8
    IDEMIA

    IDEMIA

    IDEMIA

    ...Explore the innovation trends streamlining and securing interactions between people, objects, companies, governments, and everything in between, in the physical and digital worlds. And while connections and transactions are increasingly streamlined and seemingly effortless, we tap into cryptography expertise and leadership to ensure they are safe.
    Starting Price: Free
  • 9
    MultiCharts

    MultiCharts

    MultiCharts

    ...Whether you need day trading software or you invest for longer periods, MultiCharts has features that may help achieve your trading goals. High-definition charting, built-in indicators and strategies, one-click trading from chart and DOM, high-precision backtesting, brute-force and genetic optimization, automated execution and support for EasyLanguage scripts are all key tools at your disposal.
    Starting Price: $97 per month
  • 10
    Build Alpha

    Build Alpha

    Axiom Futures

    Build Alpha uses a genetic algorithm to create thousands of algorithmic trading strategies at the click of a button. Combine, test and create millions of entry and exit signals with no coding necessary. Find complimentary filters to existing rules, improve existing strategies or create new ones. Ability to backtest, stress test and generate code from one algorithmic trading software with no code.
    Leader badge
    Starting Price: $1500 one-time
  • 11
    MEGA

    MEGA

    MEGA

    MEGA (Molecular Evolutionary Genetics Analysis) is a powerful and user-friendly software suite designed for analyzing DNA and protein sequence data from species and populations. It facilitates both automatic and manual sequence alignment, phylogenetic tree inference, and evolutionary hypothesis testing. MEGA supports a variety of statistical methods including maximum likelihood, Bayesian inference, and ordinary least squares, making it an essential tool for comparative sequence analysis and understanding molecular evolution. ...
    Starting Price: Free
  • 12
    Vytelle

    Vytelle

    Vytelle

    Vytelle is a precision livestock company reshaping how cattle producers worldwide optimize their herds. Our solutions reduce uncertainty to help you make your most important mating and reproduction decisions. Vytelle SENSE™ is our proprietary individual animal data capture system. It records feed intake and in-pen weight gain measurements to help you identify elite-performing animals expressing economically and environmentally important traits. Our low-contact devices collect key performance...
  • 13
    Afimilk

    Afimilk

    Afimilk

    ...For example, accurate heat detection replaces observations and tail chalking; milk meters automate milking; and sort gates enable efficient and scalable treatments. Afimilk results include boosting herd fertility, improving herd health, optimizing the milking process, increasing milk solids, and improving herd planning and genetics. Afimilk cow monitoring tools provide timely and accurate heat detection for improving herd fertility and optimized lactation intervals. Afimilk has become a global leader in developing, manufacturing, and marketing advanced computerized systems for the modern dairy farm, and for herd management.
    Starting Price: Free
  • 14
    CZ CELLxGENE Discover
    ...Leverage millions of cells from the integrated CZ CELLxGENE corpus for powerful analysis. Execute interactive analyses on a dataset to explore how patterns of gene expression are determined by spatial, environmental, and genetic factors using an interactive speed no-code UI. Understand published datasets or use them as a launchpad to identify new cell sub-types and states. Census provides access to any custom slice of standardized cell data available on CZ CELLxGENE Discover in R and Python. Explore an interactive encyclopedia of 700+ cell types that provides detailed definitions, marker genes, lineage, and relevant datasets in one place. ...
  • 15
    CoPlot

    CoPlot

    CoHort Software

    ...Every aspect of CoPlot has been designed around one basic goal: to make a program that is so versatile that scientists and engineers can easily get exactly what they want. CoPlot includes CoStat for data handling and statistics. Create precise technical drawings with CoPlot's versatile drawing objects. CoPlot is ideal for creating genetic maps, field maps, flow charts, apparatus diagrams, circuit diagrams, chemical structures, etc. See the sample drawings.The text in drawing objects and graphs can include HTML-like text formatting tags and over 1000 special characters. Make great scientific graphs and maps. CoPlot has seven basic types of graphs, over 40 ways of plotting data, 18 ways to plot equations, incredibly flexible attributes, asymmetric and horizontal error bars, 12 different axis types, etc.
    Starting Price: $280 one-time payment
  • 16
    Keybase

    Keybase

    Zoom Communications

    End-to-end encryption for things that matter. Keybase is secure messaging and file-sharing. We use public key cryptography to ensure your messages stay private. Even we can’t read your chats. Keybase works for families, roommates, clubs, and groups of friends, too. Keybase connects to public identities, too. You can connect with communities from Twitter, Reddit, and elsewhere. Don’t live dangerously when it comes to documents. Keybase can store your group’s photos, videos, and documents with end-to-end encryption. ...
  • 17
    restic

    restic

    restic

    ...Easily, being a single executable that you can run without a server or complex setup. Effectively, only transferring the parts that actually changed in the files you back up, Securely, by careful use of cryptography in every part of the process. Verifiably, enabling you to make sure that your files can be restored when needed. Freely, restic is entirely free to use and completely open-source. Backward compatibility for backups is important so that our users are always able to restore saved data. Therefore restic follows semantic versioning to clearly define which versions are compatible. ...
    Starting Price: Free
  • 18
    Tuta

    Tuta

    Tuta

    Tuta offers a highly secure, encrypted email, calendar, and contacts service designed to give users complete control over their data. With end-to-end encryption powered by quantum-safe cryptography, Tuta ensures that all your communications are private and safe from surveillance. The platform is easy to use, supports mobile apps for Android and iOS, and is ad-free, offering a seamless experience across multiple devices. Tuta is committed to using renewable energy to power its servers, ensuring privacy while contributing to a greener future.
    Starting Price: €1.20 per month
  • 19
    wolfSSL

    wolfSSL

    wolfSSL

    ...We secure devices against the IoT's most prevalent threat vector, which is the MITM (man in the middle) attack. wolfSSL is also popular for use in heavy load server side or cloud environments, where cryptography performance is vital. Government applications also consume wolfSSL embedded SSL, as it is FIPS 140-2 enabled. Over 2 Billion applications and devices are secured with wolfSSL products.
  • 20
    LISNR Point
    ...We enable device agnostic transmission and software allowing client control of the experience, transport layer & business model. Flexibility to support encryption, cryptography, key exchange alongside full duplex, multi-channel features, we can enable the most secure transmission method. Faster & more seamless checkout experiences enabled with the combination of range and experience control.
  • 21
    Keyote

    Keyote

    TeskaLabs

    Use your smartphone for secure authentication, next-gen logins, and more. Keyote is built by cyber security veterans, following standard authorized cryptography to give you the strongest possible protection. Everyone has a smartphone today, you don't need to have any additional hardware such as a USB token or smart card to be more secure. Software keys are easy to be copied and hence lost. Keyote stores keys in the phone security chip, effectively preventing their extraction. You must authorize the use of keys with biometry such as a fingerprint, Face ID, etc. ...
  • 22
    Confide

    Confide

    Confide

    ...Messages disappear forever after they are read once, making them as private and secure as the spoken word. Confide’s patented ScreenShield technology keeps your communication safe by preventing screenshots of your messages. Confide utilizes industry-standard cryptography to keep your messages safe and secure. We combine this with a simple and intuitive user experience to provide superior security, with no configuration required. All messages between Confide users are end-to-end encrypted. Encryption keys are generated locally on each device and the private key never leaves the device, ensuring that only the intended recipients can read your messages. ...
    Starting Price: $4.99 per user per month
  • 23
    Progress WS_FTP

    Progress WS_FTP

    Progress Software

    ...It provides SFTP transfers with the highest levels of encryption, is easy to use and customize, and reduces administrative burden. Protect files before, during, and after transfer with 256-bit AES, FIPS 140-2 validated cryptography and OpenPGP file encryption. Use SFTP to authenticate and connect to servers that require SSH clients that respond to server-defined prompts for authentication, in addition to username. Easily locate and transfer files using integrated Google™, Copernic™ or Windows® desktop search engines. Search by parameters such as file type, size, and date. ...
    Starting Price: $29.95/one-time
  • 24
    BeSafe

    BeSafe

    BeSafe

    ...Find out what matters most with instant “read” notifications and even page-by-page view analytics. We are revolutionizing end-to-end encrypted cloud collaboration with Proxy Re-Encryption cryptography. Besafe uses patent pending technology for encrypting your data and enabling secure sharing over any email or cloud file sharing application. BeSafe can be integrated to Dropbox via the user’s BeSafe web portal.
  • 25
    NordLocker

    NordLocker

    Nord Security

    Leading-edge encryption at your fingertips. We use the most advanced ciphers and principles, featuring Argon2, AES256, ECC (with XChaCha20, EdDSA and Poly1305), and other creations of modern cryptography to guarantee ultimate security of your files. Think of all the personal files you’d rather keep private. Prevent them from ending up in the wrong hands and being exploited in malicious ways. Finances, IDs, passwords. Getting this info compromised may lead to identity theft or loss of money. NordLocker ensures top-notch security for your sensitive data. ...
    Starting Price: $1.49 per month
  • 26
    TozID

    TozID

    Tozny

    An SSO and Customer Identity Management platform with privacy and end-to-end encryption built in. Centralize Access Control without centralizing your security risk. Our cryptography-at-the-edge approach delivers identity protection where you need it – secure your customer’s accounts with strong encryption and a customizable UI, or streamline protected access for your business and employees with SSO. All the features you expect – including SAML & OIDC support along with push-based MFA and more. Here are a few key features we think you’ll love! ...
  • 27
    Strongbox

    Strongbox

    Strongbox

    Strongbox provides best in class secure password management helping you keep your data secret. Protecting you from digital attacks by using recognized best practices, military grade cryptography, and industry standard formats. Strongbox not only secures your data but provides a beautiful native experience on iPhones, iPad’s and Macs. The ultimate KeePass iOS password manager. Strongbox is a native App on both iOS and MacOS platforms. This means it looks and feels just like an App should. Designed with Apple’s human interface guidelines in mind and using standard UI paradigms, controls, colours and integrations, Strongbox just feels native. ...
    Starting Price: $2.49 per month
  • 28
    iCrypto

    iCrypto

    iCrypto

    Designed to be used with our entire suite of iCrypto cloud-based services, the iCrypto SDK can integrate into existing Enterprise Apps or when deployed as iCrypto App be used as a standalone one-step password-less verification solution. By employing the latest cryptography technologies in combination with device-level security and management, the iCrypto SDK is the ultimate software token that can be used as a biometric ID on the go in a wide variety of industries. iCrypto SDK provides authenticator PKI signatures, a range of cryptographic protocols such as TOTP/HOTP/OCRA/MTP, push-based authentication, on-device as well as network-based biometrics such as fingerprint, iris scan, face/voice/eyeball recognition, third-party authorization, secure storage, context collection and host of security features.
    Starting Price: Free
  • 29
    Ente Auth
    ...It syncs codes across mobile, desktop, and web clients using fully encrypted channels, lets users import existing 2FA tokens by scanning QR codes or manual entry, and provides features like offline code generation, tagging and searching of codes, pinning favorites, icon identification, and quick “next code” display for faster logins. Backups are encrypted with audited cryptography, giving users peace of mind that only they can decrypt and access their 2FA secrets, and codes can be shared securely with teammates via encrypted links with optional expirations.
    Starting Price: Free
  • 30
    Coinomi

    Coinomi

    Coinomi

    ...All supported assets can be exchanged instantly from within the app via built-in exchanges. Your private keys never leave your device. Strong wallet encryption and cryptography guarantee that your funds will remain safe under your ultimate control. No KYC bureaucracy to access your funds, no IP association, no identity linking, no transactions tracking. Our servers anonymize your requests by hiding your IP address from prying eyes. Constant operation since 2014, never hacked, no user has ever lost funds due to Coinomi.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB