asymmetric downloads

SeriousBit Ellipter

1.8.6 download

... shareware applications and components based on Elliptic Curves Asymmetric Cryptography. Using a new and strong security technology ... Features: - Strong Encryption - SEL uses an asymmetric elliptic curves encryption algorithm to create and verify ...

Voxengo Tube Amp

2.13 download

... professional sound and music production applications that applies asymmetric tube triode overdrive usually found in single-tube microphone ... built-in oversampling and other functions. FEATURES: Asymmetric tube triode overdrive Two processing modes Additional output ...

Voxengo Tube Amp x64

2.13 download

... professional sound and music production applications that applies asymmetric tube triode overdrive usually found in single-tube microphone ... built-in oversampling and other functions. FEATURES: Asymmetric tube triode overdrive Two processing modes Additional output ...

Voxengo Tube Amp for Mac OS X

2.13 download

... professional sound and music production applications that applies asymmetric tube triode overdrive usually found in single-tube microphone ... built-in oversampling and other functions. Features: Asymmetric tube triode overdrive Two processing modes Additional output ...

Steg Easy cross platform steganography

1.1.0.0 download

... evaluates image's artifacts and uses both symmetric-key and asymmetric-key cryptography. Arbitrary data can be hidden as compressed archive file and it's also possible to add a text comment. I wrote ...

Open PGP Studio

1.2.3 download

GoAnywhere's Open PGP Studio is a free PGP file encryption tool that makes it easy to protect your sensitive files while complying with the Open PGP standard. It uses a safer ...

Open PGP Studio

1.2.3 download

GoAnywhere's Open PGP Studio is a free PGP file encryption tool that makes it easy to protect your sensitive files while complying with the Open PGP standard. It uses a safer ...

.NET PGP Library

1.11 download

If you need PGP encryption C#, this is a FIPS Compliant Library to Encrypt/Decrypt files or streams with PGP using a single line of code. It also has the ability to ...

PaintStar

2.70 download

PaintStar is a full suit of painting tools including paintbrush, airbrush, pencil, eraser, color retouching, filter brush, sharpening/blur, cloning and smudge. Many customizable brushes, texture, gradient, and 26 methods of combining ...

MDemail.net for Mac OS X

3.8.2 B798 download

... 256 bit encryption: · 2048 to 4096 bit asymmetric and 256 bit symmetric key encryption · no third party keyholder · automatic key and contact management · all services integrated ...

MDemail.net for Linux

3.8.2 B798 download

... 256 bit encryption: · 2048 to 4096 bit asymmetric and 256 bit symmetric key encryption · no third party keyholder · automatic key and contact management · all services integrated ...

OpenSSL

3.4.0 download

... From symmetric algorithms like AES and DES to asymmetric algorithms such as RSA and DSA, OpenSSL provides a versatile toolkit for developers and security professionals. It also supports cryptographic hash ...

Bat Messenger

3.2.6 download

Bat Messenger uses asymmetric cryptography algorithm to secure all messages! Prikey will ... AES256 key for encryption and decryption through an asymmetric encryption key. 3. Login encryption: The user's login password ...

discoDSP Discovery Pro

8.2 download

... Phaser, Panning Delay and Gate effects. · Symmetric, Asymmetric and Asymmetric 2 Distortions. · Limiter. · Portamento. · Poly/Mono/Legato ...

discoDSP Discovery Pro for Mac OS X

8.2 download

... Phaser, Panning Delay and Gate effects. · Symmetric, Asymmetric and Asymmetric 2 Distortions. · Limiter. · Portamento. · Poly/Mono/Legato ...

abylon BASIC

23.60.1 download

... professional user the software support the signing and asymmetric encryption on the basis of X.509 certificates (PKCS-Standard of RSA). The administration of the certificates occurs about the integrated certificate manager. ...

Voxengo VariSaturator

2.6 download

... broadband mode. The valve (tube) saturator module applies asymmetric tube processing that closely resembles sound of a high-quality tube amplifier cascade. Another saturation module VariSaturator features is a digital "waveshaping" ...

Obsidium

1.6.5-8 download

... licensing systems that take advantage of high security asymmetric encryption to prevent generation of fake license keys. Depending on your individual needs, you may choose between long and short license ...

Obsidium Lite

1.6.5-7 download

... licensing systems that take advantage of high security asymmetric encryption to prevent generation of fake license keys. Depending on your individual needs, you may choose between long and short license ...

Voxengo Voxformer VST

2.22 download

... 4-band equalizer · Real-time FFT spectrum analyzer · Asymmetric compression · Vintage saturation module · De-esser module (2 types) · Presence boosting module · Noise gate module · High quality ...

Voxengo Voxformer VST x64

2.22 download

... 4-band equalizer · Real-time FFT spectrum analyzer · Asymmetric compression · Vintage saturation module · De-esser module (2 types) · Presence boosting module · Noise gate module · High quality ...

Voxengo Voxformer VST for Mac OS X

2.22 download

... 4-band equalizer · Real-time FFT spectrum analyzer · Asymmetric compression · Vintage saturation module · De-esser module (2 types) · Presence boosting module · Noise gate module · High quality ...

SecureBridge Standard

6.0 download

... High performance * Reliable and convenient maintenance of asymmetric keys SecureBridge is tested with OpenSSH 3.8 and PuTTY. IDE Compatibility: * Embarcadero RAD Studio XE4 * Embarcadero RAD Studio XE3 ...

FireFloo Commuicator

1.0 beta download

... beta provides encrypted chat and group-chat based on asymmetric (RSA or ElGamal) encryption or, second, a symmetic chat based on end-to-end encryption. The chat app is hybrid with XMPP ...

Advanced Encryption Package 2015 Professional

6.01 download

... encryption algorithms). File and/or text encryption. Symmetric and asymmetric algorithms (17 data destruction algorithms). Secure file deletion. Using USB flash drives to store [en]-decryption keys. Creating encrypted self-extracting file to ...