ePrivacy and GPDR Cookie Consent by Cookie Consent

Related Tags

Popular x64 Tags

Results Page: 1 2 3 Next » Displayed: 1 - 25 of 75
Sort by:  relevance | title | downloads | rating | date
Devart SecureBridge
Devart SecureBridge 11.0.1   
... TCP traffic using SSH or SSL protocols and Cryptographic Message Syntax that provide authentication for client and server, strong data encryption, and data integrity verification. Its components can be used ...
Shareware | $99.95

SQLCipher
SQLCipher 4.11.0   
... new vulnerabilities and incorporate the latest advancements in cryptographic techniques. In summary, SQLCipher by ZETETIC LLC is an exceptional solution for developers seeking to implement robust, full-database encryption with ...
Freeware | $499.00

xCELLencrypt screenshot
xCELLencrypt 4.2   
... encryption standard (AES) 256 bit encryption via Microsoft's cryptographic service provider (CryptoAPI). Users may elect to encrypt with a password or through the use of a key file. xCELLencrypt is ...
Shareware | $9.99

Session
Session 1.17.2   
... voice calls, and file transfers. By using advanced cryptographic protocols, Session guarantees that your conversations remain confidential and protected from eavesdropping. Session also eliminates the need for phone numbers ...
Open Source

Inky
Inky 4.1.0 (1.4.6)   
... spear phishing. Inky assigns each employee a unique cryptographic key, and that key is only ever provisioned into that employee’s physical devices. So Inky makes impersonation and forgery impossible. ...
Freeware

Ajax Minifier
Ajax Minifier 5.14   
... you will need to provide your own AjaxMin.snk cryptographic key-pair to sign the assemblies or you will get a build error. The Ajax Minifier project does not accept external ...
Open Source

Dafny
Dafny 4.9.0   
... medical devices. - **Security:** Verifying the correctness of cryptographic algorithms and protocols to prevent vulnerabilities and exploits. - **Education:** Serving as an educational tool for teaching formal methods and program ...
Open Source

FastSum Standard Edition
FastSum Standard Edition 1.7.0.512   
... FastSum is based on a well-known and time-proven cryptographic MD5 checksum algorithm that makes the calculations and verifications very fast. Process thousends of files and see how it works, this ...
Trialware | $14.95

Zero Install Portable
Zero Install Portable 2.27.2   
... where Zero Install Portable excels. The software uses cryptographic signatures to verify the integrity and authenticity of applications before they are run. This ensures that users are protected from malicious ...
Open Source

BizCrypto for BizTalk Server
BizCrypto for BizTalk Server 14   
... PDF, XML, ZIP pipelines let you perform various cryptographic operations such as encryption, decryption, digital signing (including timestamping) and signature verification on your data. SMTP and POP3 adapters and MIME ...
Shareware | $1 066.00

BizCrypto for SQL Server
BizCrypto for SQL Server 14   
... PKI, PDF, XML tasks let you perform various cryptographic operations such as encryption, decryption, digital signing (including timestamping) and signature verification on your data. SMTP, POP3 tasks and MIME task ...
Shareware | $1 066.00

XolidoSign
XolidoSign 2.2.1.58   
... supports various signature methods, including digital certificates and cryptographic tokens, allowing users to choose the most suitable option for their security needs. This flexibility makes it an ideal solution for ...
Freeware

Ricochet Refresh
Ricochet Refresh 3.0.38   
... security patches and improvements, and it employs advanced cryptographic techniques to safeguard user data. Additionally, the decentralized nature of the platform means that there is no central point of failure, ...
Open Source

WickrMe
WickrMe 6.54.55   
... is bolstered by the app's use of advanced cryptographic protocols, which are regularly audited by third-party security experts. WickrMe also offers a self-destructing message feature, giving users control over ...
Trialware

MarshallSoft Visual Basic AES Library
MarshallSoft Visual Basic AES Library 6.0   
... - Includes Diffie-Hellman key exchange functions. - Includes cryptographically secure pseudo random number generator. - Does key ... Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. ...
Shareware | $119.00

Proton Pass for Firefox screenshot
Proton Pass for Firefox 1.32.11   
... security is bolstered by the use of open-source cryptographic algorithms, ensuring transparency and trustworthiness. Additionally, Proton Pass supports two-factor authentication (2FA), adding an extra layer of protection to your accounts. ...
Trialware | $4.99

Microsoft Safety Scanner x64
Microsoft Safety Scanner x64 1.413.543.0   
... computer, such as, MSS version number, file names, cryptographic hash, size, date stamp, and other characteristics of any Malware removed from the computer, the success or failure of Malware removal, ...
Freeware

CryptoForge
CryptoForge 5.5.0   
... Gost. It also includes powerful compression to strengthen cryptographic security even more. The command-line interface allows quick integration into automated processes and scripts, and lets you perform tasks in both ...
Shareware | $39.70

Appnimi MD5 Decrypter
Appnimi MD5 Decrypter 1.0   
... The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit (16-byte) hash value, ... has been utilized in a wide variety of cryptographic applications, and is also commonly used to verify ...
Freeware

Kaspersky CoinVaultDecryptor
Kaspersky CoinVaultDecryptor 1.0.1.0   
... a ransom for its release. By leveraging advanced cryptographic techniques, Kaspersky has developed a solution that can reverse the encryption process, restoring access to valuable data without any financial loss. ...
Freeware

Myna Password Manager
Myna Password Manager 8.0.3   
... that their sensitive information is safeguarded with state-of-the-art cryptographic techniques. Additionally, the application supports two-factor authentication (2FA), adding an extra layer of security to prevent unauthorized access even if a ...
Open Source

XCA
XCA 2.7.0   
... of XCA is its comprehensive support for various cryptographic standards and algorithms. It seamlessly handles the creation ... functionality. XCA's database-driven approach ensures that all cryptographic keys and certificates are stored securely and can ...
Open Source

EasyHash screenshot
EasyHash 1.1   
... utility designed to simplify the process of generating cryptographic hashes. This software caters to both novice users ... it a standout choice in the realm of cryptographic hashing tools. Whether you are a casual user ...
Open Source

ManageEngine Key Manager Plus
ManageEngine Key Manager Plus 7.0.0 Build 7000   
... need for organizations to secure and manage their cryptographic assets effectively, ensuring compliance, reducing risks, and enhancing ... centralization significantly reduces the complexity associated with managing cryptographic assets spread across diverse environments. One of ...
Trialware

File Checksum Calculator
File Checksum Calculator 1.2   
A standalone utility that generates and verifies cryptographic hashes in MD5, SHA-1 and SHA-256. Cryptographic hash functions are commonly used to guard against ... forms of authentication. Two of the most common cryptographic hash functions are the Secure Hash Algorithm (SHA) ...
Freeware
Results Page: 1 2 3 Next » Displayed: 1 - 25 of 75
Sort by:  relevance | title | downloads | rating | date

Members area

Login:
Password:
Remember me

Sign Up  |  Forgot Password?

Top 64-bit Downloads

Top Downloads

64-bit Tags