ePrivacy and GPDR Cookie Consent by Cookie Consent

Related Tags

Popular x64 Tags

Results Page: 1 2 3 Next » Displayed: 1 - 25 of 74
Sort by:  relevance | title | downloads | rating | date
Devart SecureBridge
Devart SecureBridge 10.8.0   
... TCP traffic using SSH or SSL protocols and Cryptographic Message Syntax that provide authentication for client and server, strong data encryption, and data integrity verification. Its components can be used ...
Shareware | $99.95

EaseFilter File System Filter Driver SDK
EaseFilter File System Filter Driver SDK 5.1.8.1   
... file on-the-fly. The encryption engine uses a strong cryptographic algorithm called Rijndael (256-bit key), it is a high security algorithm created by Joan Daemen and Vincent Rijmen (Belgium). Rijndael is ...
Shareware | $1 499.00

MarshallSoft C/C++ AES Library
MarshallSoft C/C++ AES Library 6.0   
... - Includes Diffie-Hellman key exchange functions. - Includes cryptographically secure pseudo random number generator. - Does key ... Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. ...
Shareware | $119.00

MarshallSoft Visual Basic AES Library
MarshallSoft Visual Basic AES Library 6.0   
... - Includes Diffie-Hellman key exchange functions. - Includes cryptographically secure pseudo random number generator. - Does key ... Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. ...
Shareware | $119.00

Age of Empires III
Age of Empires III 1.2.1   
... use without compromising on security. It employs contemporary cryptographic techniques to ensure data confidentiality and integrity, making ... features of Age is its use of modern cryptographic primitives. It leverages the X25519 elliptic curve for ...
Open Source

BizCrypto for SQL Server
BizCrypto for SQL Server 14   
... PKI, PDF, XML tasks let you perform various cryptographic operations such as encryption, decryption, digital signing (including timestamping) and signature verification on your data. SMTP, POP3 tasks and MIME task ...
Shareware | $1 066.00

Session
Session 1.16.5   
... voice calls, and file transfers. By using advanced cryptographic protocols, Session guarantees that your conversations remain confidential and protected from eavesdropping. Session also eliminates the need for phone numbers ...
Open Source

jk-ware Project Solutions
jk-ware Project Solutions 5.0   
... and a project to the construction of a cryptographic activation key. The source code contains multithreading and the award of license files. The resulting form administration program consist of a ...
Demo | $69.90

MarshallSoft XBase++ AES Library
MarshallSoft XBase++ AES Library 5.0   
... Performs 256-bit AES encryption and decryption. - Includes cryptographically secure pseudo random number generator. - Does key ... Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. ...
Shareware | $119.00

EaseFilter File Encryption On The Go SDK
EaseFilter File Encryption On The Go SDK 5.1.8.1   
... processes to access the encrypted files. Supported strong cryptographic algorithm Rijndael is a high security algorithm which was chosen by the National Institute of Standards and Technology (NIST) as the ...
Shareware | $2 999.00

DevToys
DevToys 1.0.13.0   
... toolkit includes utilities for generating secure passwords, calculating cryptographic hashes (MD5, SHA-1, SHA-256), and even encoding and decoding JWT tokens. These tools help developers implement and maintain high security standards ...
Open Source

Syncthing
Syncthing 1.30.0   
... encrypted using TLS, and the software uses strong cryptographic protocols to ensure that your data remains secure during transit. Additionally, since Syncthing is open-source, its code is transparent and can ...
Open Source

Stunnel
Stunnel 5.74   
... robust encryption and supports a wide array of cryptographic algorithms, ensuring that it remains resilient against evolving cyber threats. Regular updates and a proactive approach to vulnerability management further enhance ...
Open Source

NordLocker
NordLocker 4.30.0.0   
... information is protected by the highest standards of cryptographic security. The software uses end-to-end encryption, meaning that only you hold the keys to decrypt your files, providing peace of mind ...
Shareware

encrypt0r
encrypt0r 3.12.58   
... algorithms to safeguard your data. By utilizing advanced cryptographic techniques, it ensures that your sensitive information remains protected from unauthorized access. **3. Passphrase-Based Security:** The software leverages a passphrase-based ...
Open Source

BestSync Portable x64
BestSync Portable x64 2024 (19.0.1.5)   
... a folder with a ZIP file, support AES cryptographic algorithm to protect the zip file with password. Synchronize Outlook (mail, contact, etc) and Windows Mail between PCs by utilizing USB ...
Trialware | $19.95

iSeePassword - iTunes Password Recovery V2.1.3.0 screenshot
iSeePassword - iTunes Password Recovery V2.1.3.0 2.1.3.0   
... advantage of the advances in cryptanalysis to render cryptographic algorithms insecure. Brute force attack on cryptographic algorithm makes it extremely easy and safe to ...
Shareware | $39.95

BizCrypto for BizTalk Server
BizCrypto for BizTalk Server 14   
... PDF, XML, ZIP pipelines let you perform various cryptographic operations such as encryption, decryption, digital signing (including timestamping) and signature verification on your data. SMTP and POP3 adapters and MIME ...
Shareware | $1 066.00

SQLCipher
SQLCipher 4.9.0   
... new vulnerabilities and incorporate the latest advancements in cryptographic techniques. In summary, SQLCipher by ZETETIC LLC is an exceptional solution for developers seeking to implement robust, full-database encryption with ...
Freeware

xCELLencrypt screenshot
xCELLencrypt 4.2   
... encryption standard (AES) 256 bit encryption via Microsoft's cryptographic service provider (CryptoAPI). Users may elect to encrypt with a password or through the use of a key file. xCELLencrypt is ...
Shareware | $9.99

Ricochet Refresh
Ricochet Refresh 3.0.32   
... security patches and improvements, and it employs advanced cryptographic techniques to safeguard user data. Additionally, the decentralized nature of the platform means that there is no central point of failure, ...
Open Source

WickrMe
WickrMe 6.54.55   
... is bolstered by the app's use of advanced cryptographic protocols, which are regularly audited by third-party security experts. WickrMe also offers a self-destructing message feature, giving users control over ...
Trialware

Inky
Inky 4.1.0 (1.4.6)   
... spear phishing. Inky assigns each employee a unique cryptographic key, and that key is only ever provisioned into that employee’s physical devices. So Inky makes impersonation and forgery impossible. ...
Freeware

Ajax Minifier
Ajax Minifier 5.14   
... you will need to provide your own AjaxMin.snk cryptographic key-pair to sign the assemblies or you will get a build error. The Ajax Minifier project does not accept external ...
Open Source

wodSSH
wodSSH 3.1.1   
... low level transport protocol. It provides strong encryption, cryptographic host authentication, and integrity protection. Using wodSSH is easily - just put it on your form, set Protocol type and issue ...
Shareware | $189.00
Results Page: 1 2 3 Next » Displayed: 1 - 25 of 74
Sort by:  relevance | title | downloads | rating | date

Members area

Login:
Password:
Remember me

Sign Up  |  Forgot Password?

Top 64-bit Downloads

Top Downloads

64-bit Tags