cryptographic related free software
Search results for tag «cryptographic related»:
Crypto Tools 1.01
… ssed with any non lossy algorithm).
Crypto Tools usually doesn't need any kind of installation, simply copy the executables where you desire, but for special issues and for more informations see the documentation.…
CheckSummer 0.2
… ographic checksums of arbitrary files. It supports MD5, SHA-1, and SHA-256 digest algorithms.
CheckSummer's interface is not clogged up with useless graphics or unnecessary buttons and is very easy to use.
Requirements
Java Runtime Environment…
Omziff 3.0.9
… Rijndael, and Twofish.
Omziff will also generate random passwords, splits files and does simple file shredding according to DOD Standards. It is freeware, comes in a standalone executable file with no dependencies and is completely USB compatible!…
P-Guard 1.03
… , who is owner of encrypted file may decrypt this file.
Shell integration allows to use P-Guard with maximum comfort: You can start P-Guard from right-mouse context menu or you can easily integrate the P-Guard in your favorite file manager.…
Secure Disk 2.22
… and proven Blowfish cryptographic algorithm will make your encrypted disk unconquerable
Very fast encryption. You may even not notice the time it used.
Easy to use. Both the creation of a new container and the mount process are very simple.
Su…
Compare PDF 3.0
… olders and files within it.
If you work with plain text, then you can edit compared documents, apply or decline changes.
Finally, you will be able to bring comparison details to simple or advanced structured report.
Limitations
30 days trial…
SQLcrypt 1.5
… ied passphrase. Sidestep the difficult cryptographic problems of secure key generation and management. SQLcrypt is implemented in portable C code. It is immediately available for the Windows platform. Ask us about BSD, Linux, OS X and Solaris.…
Entropia Password Manager & Generator 1.3
… Entropia is an application which actually does two things: (a) Stores passwords using modern secure cryptographic methods and (b) Generates passwords using random or pseudo random options.
Limitations 30 days full featured shareware.…
Hiron 2.9.5.11
… novative encryption technology. A higher-order elliptic curve is used for asymmetric (public key) encryption.
The program was designed and implemented by a professional theoretical physicist who also is an experienced cryptography programmer.…
SALVADOR 2.7.2
… d, signed and, at the desire, the compressed base. That, the malefactor cannot not only get access to contents of base but also how to modify it, that misinforming the owner of base.
The interface, for years of use in the several large organizatio…
Related: