Home |
![]() |
![]() |
What Is Euphoria? |
![]() |
![]() |
Documentation |
![]() |
![]() |
News |
![]() |
![]() |
EUforum |
![]() |
![]() |
Download Euphoria |
![]() |
![]() |
Donate |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
|||||||
![]() |
Recent User Contributions |
![]() |
![]() |
The Archive |
![]() |
![]() |
Other Euphoria Web Sites |
![]() |
![]() |
RDS Development |
![]() |
![]() |
Related Books & Software |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
|
![]() |
|
![]() |
|
Search Results |
matched 17 of 2190 entries
LNX | Holistic Encryption | 3K | Peter Blue | Mar 9/04 | ![]() |
||
This encryption system works by joining one or more chunks of data into a continuous stream and then randomly 'scattering' all the bytes in that stream according to a pre-defined key sequence. The key can be any length. Additional layers of encryption can be applied. A simple XOR system is used here. He has no idea how hard this system would be to crack. Perhaps someone can try. It was developed on Linux but should be easy to port to DOS, Windows or FreeBSD. | |||||||
GEN | Simple XOR Encryption | 2K | Ricardo Forno | Jan 1/07 | ![]() |
||
A very simple but effective program for file encryption / decryption using the XOR method. You select a key string and use it to encrypt / decrypt a file of any type. Exactly the same program is used in both cases. Both parties must know the key. Dec 31: Great improvement preventing brute force attacks after a mail exchange with Derek Parnell. | |||||||
GEN | Elfin Encryption | 26K | Emlyn Merlyn | Sep 22/04 | ![]() |
||
A simple, new encryption algorithm that features up to 2048 bit keys. Sep 22: Elfin is now more secure, with a few more routines | |||||||
GEN | Arcfour Encryption Algorithm | 8K | Davi Figueiredo | Oct 19/02 | ![]() |
||
A powerful encryption algorithm used in many Internet protocols. v1.12 | |||||||
GEN | Encryption Benchmark | 318K | George Orr | Feb 26/01 | ![]() |
||
Comparisons of binding vs. translating vs. interpreting a small encryption algorithm. | |||||||
DOS | Simple Encryption Program | 46K | Matt Arriola | Jan 10/01 | ![]() |
||
His own encryption algorithm. Jan 10: bug fix | |||||||
GEN | Encrypt Files | 9K | Daryl van den Brink | Apr 13/02 | ![]() |
||
A simple encryption algorithm based on Euphoria's random number generator. Apr 13: stronger encryption, Linux bug fixed | |||||||
DOS | Padlock I/O Encryption Library | 12K | Roderick Jackson | Jul 16/01 | ![]() |
![]() |
|
A library that lets you easily encrypt the data that you write to files. Jul 16: multiple passkeys can now be used, a function is included to allow passkey validation, and the library is released as source code (no longer shrouded.) | |||||||
WIN | Encryption Utility | 112K | Hayden McKay | Jan 25/04 | ![]() |
||
Encrypt or Decrypt any file. Easy to use. (shrouded source) Jan 25: A lot faster, new GUI, rewrote arcfour alog, merged read and encrypt/decrypt process. MD5 password protection, validity check. | |||||||
WIN | Simple Encryption Program | 97K | Marc Hoover | Nov 15/01 | ![]() |
||
Encrypt/Decrypt your documents. | |||||||
WIN | Rotmg 13.2 Game Client | 775K | gaz | May 9/13 | ![]() |
||
This a Client for http://www.realmofthemadgod.com/ This code is the bare essentials required to make a client/proxy for rotmg, it uses RC4, RSA public key, base64 encryption, sockets, Euphoria v3.1.1, Win32lib v0.70.20, required, source code included | |||||||
WIN | E-Mail Client | 416K | Jordah Ferguson | Apr 12/02 | ![]() |
![]() |
|
An impressive full-featured e-mail client. He hopes to get feedback so he can improve it. It uses Win32Lib, EDS, and RC4 data encryption. Apr 12: major new release - many new features, supports MIME standards, can send/receive any kind of attachment, and much more | |||||||
GEN | Blowfish for Euphoria | 12K | Alexander Toresson | Jan 28/04 | ![]() |
![]() |
|
This include file enables you to encrypt and decrypt a byte sequence or any sequence with the powerful encryption algorithm Blowfish. Jan 28: You can now make this lib catch all output/input to any files and automatically encrypt/decrypt it. | |||||||
GEN | sTEGO ALGo(rithm) | 1K | William Heimbigner | Sep 7/04 | ![]() |
||
This is to become an advanced stegonography library written in 100% pure Euphoria. So far includes only 1 algorithm, inspired by the SNOW algorithm (Steganographic Nature Of Whitespace). This does not utilize any true encryption and therefore is not subject to US export regulations. This snow algorithm hides a message in a .txt file, which appears blank when opened with notepad! | |||||||
GEN | Compression Testing Demo | 16K | Hayden McKay | Aug 11/04 | ![]() |
||
A compression tester. Parses a directory with Huff.ex, Reduce.e and lzss.e and builds a report to help you decide the best compression method to archive a specific file or directory. Aug 11: removed "Encryption Utility" | |||||||
GEN | Assorted Math Routines | 11K | Laurence Draper | Nov 30/99 | ![]() |
||
A collection of advanced math routines such as FFT, Big Numbers, prime numbers, encryption etc. | |||||||
GEN | Euphoria Data Manipulation | 3K | Ralf Nieuwenhuijsen | May 17/97 | ![]() |
||
routines for converting Euphoria data objects to bits, and for encrypting data. (The U.S. government needn't be concerned - his encryption algorithm is weak enough for legal export to any country!) | |||||||