Data Protection for Encryption
Tools and techniques for safeguarding sensitive data and implementing robust encryption. Task: EncryptionExplore 15 curated tools and resources
RELATED TASKS
PINNED
Promoted • 4 toolsWant your tool featured here?
Get maximum visibility with pinned placement
LATEST ADDITIONS
A cloud-native data security platform that provides data access governance, monitoring, masking, classification, and encryption capabilities with specialized integration for Snowflake environments.
A cloud-native data security platform that provides data access governance, monitoring, masking, classification, and encryption capabilities with specialized integration for Snowflake environments.
A quantum-safe data protection solution that secures data in transit using Layer 4 encryption, crypto-segmentation, and unified security reporting to defend against current and future cryptographic threats.
A quantum-safe data protection solution that secures data in transit using Layer 4 encryption, crypto-segmentation, and unified security reporting to defend against current and future cryptographic threats.
OpenFHE is an open-source library implementing post-quantum Fully Homomorphic Encryption schemes with simplified APIs and cross-platform support.
OpenFHE is an open-source library implementing post-quantum Fully Homomorphic Encryption schemes with simplified APIs and cross-platform support.
Zama's fhEVM Coprocessor is an open-source tool for developing applications using Fully Homomorphic Encryption, enabling privacy-preserving computations in various domains.
Zama's fhEVM Coprocessor is an open-source tool for developing applications using Fully Homomorphic Encryption, enabling privacy-preserving computations in various domains.
A PHP library for secure data encryption with easy-to-use API.
Tang is a server for binding data to network presence, providing an easy and secure alternative to key escrow.
Tang is a server for binding data to network presence, providing an easy and secure alternative to key escrow.
Showcasing bad cryptography and discussing flawed crypto design.
Clevis is a pluggable framework for automated decryption.
Microsoft BitLocker is a full volume encryption feature in Windows for protecting data on lost or stolen devices, with tools and resources for implementation.
Microsoft BitLocker is a full volume encryption feature in Windows for protecting data on lost or stolen devices, with tools and resources for implementation.
StegCloak is a JavaScript steganography module for hiding secrets inside text using invisible characters.
StegCloak is a JavaScript steganography module for hiding secrets inside text using invisible characters.
A cloud-based key management service for encrypting and digitally signing data.
A cloud-based key management service for encrypting and digitally signing data.
Simple C++ Encryption and Steganography tool for hiding files inside images using LSB encoding.
Simple C++ Encryption and Steganography tool for hiding files inside images using LSB encoding.
SOPS is an editor of encrypted files supporting various formats and encryption methods.
SOPS is an editor of encrypted files supporting various formats and encryption methods.
Red October is a software-based two-man rule style encryption and decryption server.
Red October is a software-based two-man rule style encryption and decryption server.
Steghide is a steganography program that hides data in image and audio files.
Steghide is a steganography program that hides data in image and audio files.