cryptographic downloads
MarshallSoft dBase AES Library
5.0 download... Performs 256-bit AES encryption and decryption. - Includes cryptographically secure pseudo random number generator. - Does key ... Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. ...
MarshallSoft XBase++ AES Library
5.0 download... Performs 256-bit AES encryption and decryption. - Includes cryptographically secure pseudo random number generator. - Does key ... Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. ...
MarshallSoft Delphi AES Library
6.0 download... - Includes Diffie-Hellman key exchange functions. - Includes cryptographically secure pseudo random number generator. - Does key ... Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. ...
fHash
3.11.2.0 download... does not disappoint. By supporting a range of cryptographic hash functions, it provides robust protection against data tampering and unauthorized modifications. This makes it a reliable choice for anyone looking ...
Afick
3.8.1 download... concern for Afick. It includes features such as cryptographic checksums to ensure the integrity of the monitored files and directories. Additionally, it can be configured to send alerts via email ...
CHK File Recovery
5.51 download... distribution. At its core, CHK employs advanced cryptographic hash functions to generate unique checksums for files. These checksums act as digital fingerprints, allowing users to compare and verify files ...
Appnimi MD2 Decrypter
1.0 download... is FREE. The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989.[2] The algorithm is optimized for 8-bit computers. MD2 is specified in RFC 1319. ...
BizCrypto for BizTalk Server
14 download... PDF, XML, ZIP pipelines let you perform various cryptographic operations such as encryption, decryption, digital signing (including timestamping) and signature verification on your data. SMTP and POP3 adapters and MIME ...
BizCrypto for SQL Server
14 download... PKI, PDF, XML tasks let you perform various cryptographic operations such as encryption, decryption, digital signing (including timestamping) and signature verification on your data. SMTP, POP3 tasks and MIME task ...
EaseFilter Auto File Encryption
5.1.8.1 download... processes to access the encrypted files. Supported strong cryptographic algorithm Rijndael is a high security algorithm which was chosen by the National Institute of Standards and Technology (NIST) as the ...
EaseFilter File System Filter Driver SDK
5.1.8.1 download... file on-the-fly. The encryption engine uses a strong cryptographic algorithm called Rijndael (256-bit key), it is a high security algorithm created by Joan Daemen and Vincent Rijmen (Belgium). Rijndael is ...
Tails OS
3.7 download... using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. Tails 2.11 will be the last version to include I2P, an ...
Inky
4.1.0 (1.4.6) download... spear phishing. Inky assigns each employee a unique cryptographic key, and that key is only ever provisioned into that employee’s physical devices. So Inky makes impersonation and forgery impossible. ...
Syncthing
1.28.0 download... encrypted using TLS, and the software uses strong cryptographic protocols to ensure that your data remains secure during transit. Additionally, since Syncthing is open-source, its code is transparent and can ...
EaseFilter File Encryption On The Go SDK
5.1.8.1 download... processes to access the encrypted files. Supported strong cryptographic algorithm Rijndael is a high security algorithm which was chosen by the National Institute of Standards and Technology (NIST) as the ...
iAntiSpy
1.7 download... the request itself is transformed using a one-way cryptographic hash function before processing. The only place the actual requested domain is stored is temporarily in memory, and only for the ...
Proton Pass for Firefox
1.24.4 download... security is bolstered by the use of open-source cryptographic algorithms, ensuring transparency and trustworthiness. Additionally, Proton Pass supports two-factor authentication (2FA), adding an extra layer of protection to your accounts. ...
Myna Password Manager
8.0.3 download... that their sensitive information is safeguarded with state-of-the-art cryptographic techniques. Additionally, the application supports two-factor authentication (2FA), adding an extra layer of security to prevent unauthorized access even if a ...
Zero Install Portable
2.26.0 download... where Zero Install Portable excels. The software uses cryptographic signatures to verify the integrity and authenticity of applications before they are run. This ensures that users are protected from malicious ...
WickrMe
6.46.11 download... is bolstered by the app's use of advanced cryptographic protocols, which are regularly audited by third-party security experts. WickrMe also offers a self-destructing message feature, giving users control over ...
Session
1.14.2 download... voice calls, and file transfers. By using advanced cryptographic protocols, Session guarantees that your conversations remain confidential and protected from eavesdropping. Session also eliminates the need for phone numbers ...
Random Wordlist Generator
1.5 download... high levels of randomness and unpredictability, such as cryptographic research or game development. 7. **Regular Updates and Support:** VOVSOFT is known for its commitment to quality and customer satisfaction. ...
encrypt0r
3.12.52 download... algorithms to safeguard your data. By utilizing advanced cryptographic techniques, it ensures that your sensitive information remains protected from unauthorized access. **3. Passphrase-Based Security:** The software leverages a passphrase-based ...
Avast Decryption Tool for Legion Ransomware
1.0.0.737 download... algorithms employed by Legion Ransomware. By leveraging advanced cryptographic techniques, it can decrypt a wide range of file types, ensuring that your documents, images, videos, and other critical data are ...
DevToys
1.0.13.0 download... toolkit includes utilities for generating secure passwords, calculating cryptographic hashes (MD5, SHA-1, SHA-256), and even encoding and decoding JWT tokens. These tools help developers implement and maintain high security standards ...