Cryptographic Software - Free Download Cryptographic - Top 4 Download

Cryptographic search results

Cryptnos 1.3.3

... will help you generate strong, pseudo-random passwords using cryptographic hashes. Cryptnos combines a unique "site token" ... master password and runs this data through a cryptographic hash algorithm to produce a password that is ... provides unparalleled versatility by letting you specify the cryptographic hash to use, how many iterations of the ...

Toms Hash Explorer 1.2

Toms Hash Explorer is a fast multi-threaded cryptographic hash calculation suite with an innovative Explorer-like user ... free Windows utility allows you to easily calculate cryptographic hash values for single files or entire folders to verify file integrity. Supports the most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including ...

WinHasher 1.6.2.67

WinHasher is a free, Open Source cryptographic hash or digest generator written in C# using ... to some degree generate strong, unique passwords. Cryptographic hashing is readily available on many computer operating ... component. OpenSSL includes several command-line components for generating cryptographic hashes and there are number of graphical user ... Windows does not include any built-in utilities for cryptographic hashes, and installing and using OpenSSL on Windows ...

Guarded Key 1.2.2

... with one-click + Use one password forever + Cryptographic security token - setup Certificate and RSA Signature + Portable - USB flash drive, memory card + Bank account and Credit/Debit card management + Contacts - Name, Birth date, Address, Phone, Email, Website, Social networks + Product codes, Registration/Activation codes + ...
software award

XCA 2.7.0

... of XCA is its comprehensive support for various cryptographic standards and algorithms. It seamlessly handles the creation ... functionality. XCA's database-driven approach ensures that all cryptographic keys and certificates are stored securely and can ... as it provides a centralized repository for all cryptographic assets. The software also supports the import ...

VSCryptoHash 2.5.3.509

VSCryptoHash is cryptographic hash calculation software. Simply drag and drop files ... file control sums. VSCryptoHash supports a variety of cryptographic hash functions, including SHA-1, SHA-256, SHA-384, SHA-512, MD5, MD4 and MD2. ...

VSCryptoHash 64-bit 2.5.3.509

VSCryptoHash 64-bit is cryptographic hash calculation software. Simply drag and drop files ... file control sums. VSCryptoHash supports a variety of cryptographic hash functions, including SHA-1, SHA-256, SHA-384, SHA-512, MD5, MD4 and MD2. ...

Batch File Encrypt Free 5.0.133

... encrypt files with a single password or specify cryptographic keys (vectors) instead. You can change key bit length for better protection. You can select specifically which bytes in a file should be encrypted/decrypted, though by default the whole file is processed. Process 1000s of files using multiple CPU cores in ...

SB-MD5 Calculator 1.0.7

... MD5 (Messege-Digest Algorithm 5) is a widely used cryptographic hash function with 128-bit hash value. The MD5 hash is like a fingerprint of a file. Features •Calculate MD5 checksum of a file. •Compare MD5 checksum of two files. •Copy MD5 hash to Windows clipboard. •Compare value from the clipboard with ...

CHAOS Messenger 4.0

CHAOS Messenger is the utility program that creates active Chaos files for Windows. Active Chaos files are executable programs (EXEs) that contain a Chaos file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable Chaos files that anyone can use to encrypt messages ...

Active CHAOS 5.0

Active CHAOS is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is ...

CHAOS Self Decryptor 3.9

CHAOS Self-Decryptor is the utility program that creates self-decrypting chaos files for Windows. Self-decrypting chaos files are executable programs (EXEs) that contain a chaos file and the software necessary to decrypt the contents. Users can create self-decrypting executable files that anyone can decrypt with the proper password. No other software is ...

ABC CHAOS 2.75

ABC CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. ...

Abacre File Encryptor 1.0

With Abacre File Encryptor you may encrypt any files or folders by using 39 advanced encryption algorithms (CAST, Blowfish, Twofish, Rijndael and others). Files maybe encrypted into either one single file either individually. It's also possible to compress files during encryption so the resulting file size will be even smaller to ...

Age of Empires III 1.2.1

... use without compromising on security. It employs contemporary cryptographic techniques to ensure data confidentiality and integrity, making ... features of Age is its use of modern cryptographic primitives. It leverages the X25519 elliptic curve for ... protected against contemporary threats. The reliance on well-regarded cryptographic standards also means that Age is likely to ...
software pick

VSFileHash 1.0.3.121

VSFileHash is a cryptographic hash calculation software. Simply drag and drop file ... file control sums. VSFileHash supports a variety of cryptographic hash functions, including SHA1, SHA-224, SHA-256, SHA-384, SHA-512, ... Skein1024-1024, MD2, MD4, MD5, Panama, Adler32, CRC32. Some cryptographic hash functions are available only in the premium version of VSFileHash (Windows, ...

VSTextHash 1.0.3.65

VSTextHash is a cryptographic hash calculation software. This software lets you hash ... be immediately displayed. VSTextHash supports a variety of cryptographic hash functions, including SHA1, SHA-224, SHA-256, SHA-384, SHA-512, ... Skein1024-1024, MD2, MD4, MD5, Panama, Adler32, CRC32. Some cryptographic hash functions are available only in the premium version of VSTextHash (Windows, ...

xCELLencrypt 4.2

... encryption standard (AES) 256 bit encryption via Microsoft's cryptographic service provider (CryptoAPI). Users may elect to encrypt with a password or through the use of a key file. xCELLencrypt is great for individuals or organizations that share spreadsheets but need to protect certain data within the workbooks. Some examples are: ...

VMPCrypt 5

Top-class encryption tool based on an independent VMPC cryptographic technology. Developed since 2004 by cryptography expert Bartosz Zoltak. * Encrypt your files/folders and store them either in a single encrypted archive-file (many-to-one mode, like ZIP) or in the one-to-one mode, where an encrypted copy of each file is created. * ...

FastSum 1.9

... through the usage of a well-known and time-proved cryptographic algorithm, as a matter of fact FastSum is a Windows MD5 Checker. You do not have to be afraid of these unintelligible words, all you have to know is – how to run FastSum. You can rectify the errors occurring while ...

BrainWave RandomPass 2.4.0.360

... random number or numbers using a variety of cryptographic hashing algorithms. Can be used to produce or set highly secure passwords of variable length. Can also produce GUID-like values. -q ........ Suppress the header (and password length) information -i ........ Include the following special characters: <>"^'%&`| -e ........ Exclude the ...

Backup verification tool 1.3

... the original. This is done by calculating a cryptographic checksum using the md5 message-digest algorithm on each file from the source and the copy destination. The checksums for each file are then compared. Any difference indicates that the copied file is not the same as the original source file. Name ...

ViewPoint 5.01

Everybody has a right to privacy and business secrets. You have a little secret. It is saved as a graphics file (illustration, photo, scanned document, etc.). You do not want anyone to know your secret and anyone to suspect you have a secret. ViewPoint allows the user to conceal details (of ...
software award

AxCrypt 2.1.1494

Password protection for files using strong encryption for Windows Vista or later using the AES algorithm with 256-bit or 128-bit keys. It combines strong symmetric encryption with compression and double-click editing/viewing. Encrypted files have a '.AXX' extension added to their names, and are shown with a new icon. To encrypt a ...
software award

CryptoLicensing For MFC 2020 B200525

... for MFC uses the latest military strength, state-of-the-art cryptographic technology to ensure that your software and intellectual ... FEATURES: Military-strength security Secure and unbreakable cryptographic licenses offer maximum protection to your software. ... for the most common licensing scenarios. * Cryptographic licenses for full versions of your software. * ...
software pick

Cryptographic download notice

Top 4 Download periodically updates software information of cryptographic full versions from the publishers, but some information may be slightly out-of-date.

Using warez version, crack, warez passwords, patches, serial numbers, registration codes, key generator, pirate key, keymaker or keygen for cryptographic license key is illegal. Download links are directly from our mirrors or publisher's website, cryptographic torrent files or shared files from free file sharing and free upload services, including Rapidshare, MegaUpload, YouSendIt, Letitbit, DropSend, MediaMax, HellShare, HotFile, FileServe, LeapFile, MyOtherDrive or MediaFire, are not allowed!

Your computer will be at risk getting infected with spyware, adware, viruses, worms, trojan horses, dialers, etc while you are searching and browsing these illegal sites which distribute a so called keygen, key generator, pirate key, serial number, warez full version or crack for cryptographic. These infections might corrupt your computer installation or breach your privacy. cryptographic keygen or key generator might contain a trojan horse opening a backdoor on your computer.