cryptographic downloads

Zero Install

2.26.3 download

... paramount concern for Zero Install. The software employs cryptographic signatures to verify the integrity and authenticity of downloaded applications and their dependencies. This ensures that users are protected from malicious ...

New Version

MarshallSoft C/C++ AES Library

6.0 download

... - Includes Diffie-Hellman key exchange functions. - Includes cryptographically secure pseudo random number generator. - Does key ... Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. ...

MarshallSoft Visual Basic AES Library

6.0 download

... - Includes Diffie-Hellman key exchange functions. - Includes cryptographically secure pseudo random number generator. - Does key ... Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. ...

MarshallSoft FoxPro AES Library

6.0 download

... - Includes Diffie-Hellman key exchange functions. - Includes cryptographically secure pseudo random number generator. - Does key ... Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. ...

MarshallSoft dBase AES Library

5.0 download

... Performs 256-bit AES encryption and decryption. - Includes cryptographically secure pseudo random number generator. - Does key ... Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. ...

MarshallSoft XBase++ AES Library

5.0 download

... Performs 256-bit AES encryption and decryption. - Includes cryptographically secure pseudo random number generator. - Does key ... Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. ...

MarshallSoft Delphi AES Library

6.0 download

... - Includes Diffie-Hellman key exchange functions. - Includes cryptographically secure pseudo random number generator. - Does key ... Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. ...

fHash

3.11.3.0 download

... does not disappoint. By supporting a range of cryptographic hash functions, it provides robust protection against data tampering and unauthorized modifications. This makes it a reliable choice for anyone looking ...

Afick

3.8.1 download

... concern for Afick. It includes features such as cryptographic checksums to ensure the integrity of the monitored files and directories. Additionally, it can be configured to send alerts via email ...

CHK File Recovery

5.52 download

... distribution. At its core, CHK employs advanced cryptographic hash functions to generate unique checksums for files. These checksums act as digital fingerprints, allowing users to compare and verify files ...

Appnimi MD2 Decrypter

1.0 download

... is FREE. The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989.[2] The algorithm is optimized for 8-bit computers. MD2 is specified in RFC 1319. ...

BizCrypto for BizTalk Server

14 download

... PDF, XML, ZIP pipelines let you perform various cryptographic operations such as encryption, decryption, digital signing (including timestamping) and signature verification on your data. SMTP and POP3 adapters and MIME ...

BizCrypto for SQL Server

14 download

... PKI, PDF, XML tasks let you perform various cryptographic operations such as encryption, decryption, digital signing (including timestamping) and signature verification on your data. SMTP, POP3 tasks and MIME task ...

EaseFilter Auto File Encryption

5.1.8.1 download

... processes to access the encrypted files. Supported strong cryptographic algorithm Rijndael is a high security algorithm which was chosen by the National Institute of Standards and Technology (NIST) as the ...

EaseFilter File System Filter Driver SDK

5.1.8.1 download

... file on-the-fly. The encryption engine uses a strong cryptographic algorithm called Rijndael (256-bit key), it is a high security algorithm created by Joan Daemen and Vincent Rijmen (Belgium). Rijndael is ...

Tails OS

3.7 download

... using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. Tails 2.11 will be the last version to include I2P, an ...

Inky

4.1.0 (1.4.6) download

... spear phishing. Inky assigns each employee a unique cryptographic key, and that key is only ever provisioned into that employee’s physical devices. So Inky makes impersonation and forgery impossible. ...

Syncthing

1.28.1 download

... encrypted using TLS, and the software uses strong cryptographic protocols to ensure that your data remains secure during transit. Additionally, since Syncthing is open-source, its code is transparent and can ...

EaseFilter File Encryption On The Go SDK

5.1.8.1 download

... processes to access the encrypted files. Supported strong cryptographic algorithm Rijndael is a high security algorithm which was chosen by the National Institute of Standards and Technology (NIST) as the ...

iAntiSpy

1.7 download

... the request itself is transformed using a one-way cryptographic hash function before processing. The only place the actual requested domain is stored is temporarily in memory, and only for the ...

Proton Pass for Firefox

1.28.0 download

... security is bolstered by the use of open-source cryptographic algorithms, ensuring transparency and trustworthiness. Additionally, Proton Pass supports two-factor authentication (2FA), adding an extra layer of protection to your accounts. ...

New Version

Myna Password Manager

8.0.3 download

... that their sensitive information is safeguarded with state-of-the-art cryptographic techniques. Additionally, the application supports two-factor authentication (2FA), adding an extra layer of security to prevent unauthorized access even if a ...

Zero Install Portable

2.26.3 download

... where Zero Install Portable excels. The software uses cryptographic signatures to verify the integrity and authenticity of applications before they are run. This ensures that users are protected from malicious ...

New Version

WickrMe

6.48.23 download

... is bolstered by the app's use of advanced cryptographic protocols, which are regularly audited by third-party security experts. WickrMe also offers a self-destructing message feature, giving users control over ...

Session

1.14.3 download

... voice calls, and file transfers. By using advanced cryptographic protocols, Session guarantees that your conversations remain confidential and protected from eavesdropping. Session also eliminates the need for phone numbers ...