HIME: Huge Integer Math and
RSA public key, AES, RC4 secret key encryption, MD5, SHA-512 hash function, random number generation (Blum-Blum-Shub, RSA), Diffie-Hellman, compression, securely erase files. Every programming language that can access a dll can use HIME: C, C++, C#, ...
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- SSuite Office Premium HD+
- Android Files Recovery Program
- FoneLab HyperTrans
- Convert MySQL to Microsoft SQL
- Aiseesoft FoneLab for Android
- AnyMP4 Blu-ray Creator
- Flash Drive Data Restore
- FAT Volume Data Recovery
- Restore Deleted Mac Files
- Quick Receipt Software
- UltraFileSearch Std Portable
- MSMassEmailSenderPro
- USB Flash Drive Recovery
- Softaken MS Excel Recovery
- ToolsBaer MSG to Hotmail...
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Public Key Format Download
-
26$59.00
-
27CommuniCrypt Standard Edition 1.14
It works like a messenger or a chat tool, but the complete data transfer between both machines are highly encrypted through Public-Key-Encryption with RSA encryption algorithm (RSAES-OAEP). The key length of public and private key may between 338 and ...$19.00 -
28SecureCRT 7.3.6
Access an array of network devices via SSH1, SSH2, Telnet, Telnet/SSL, Serial, and other protocols, with authentication via password, public key, X.509 certificate, Kerberos v5 via GSSAPI, and keyboard interactive. Ciphers include AES, AES-CTR, Twofish, ...$99.00
Buy -
29Sysax FTP Automation 6.18
It has many useful features such as transfer status monitoring, email notification, file (de)compression, OpenPGP Encryption and Decryption, task scheduling, FTP scripting, public key authentication, client side SSL certificates and detailed log files.$197.00
Buy -
30Softerra LDAP Administrator 2010.1
For example, these systems could be LDAP-based distributed emailing or public key management using various LDAP servers such as Active Directory, Novell Directory Services or Netscape/iPlanet.$200.00
Buy -
31SSH Factory 3.7
Feature Summary: * Includes both SSH and telnet components * Comprehensive API for building and automating tasks * Easy to use language for scripting tasks in plain text files without having to compile Java code * Support for authenticating with servers using public key authentication ...$599.00
Buy -
32SecureBlackbox (ActiveX/DLL) 7.1
* PKIBlackbox - Generate, validate and manage objects of Public Key Infrastructure (X.509 certificates, certificate requests, certificate revocation lists, certificate storages etc.). Get access to cryptography hardware (USB cryptotokens, smartcards).$956.00
Buy -
33Xceed Encryption Library 1.1
Supports traditional secret-key encryption & public-key encryption, and can encrypt/decrypt memory buffers, strings, blobs, streaming data or files. Supports AES (US Advanced Encryption Standard) symmetric encryption algorithm (Rijndael) and Twofish, ...$299.95 -
34Advanced Encryption Package 2005
The latest version has support for RSA algorithm and Public-Private Key cryptography. One key is kept secret and is referred to as the private key while the other is made available to others and is called the public key since anyone can access this ...$49.95 -
35Strong File Encryption Decryption
PrimaSoft Strong File Encryption and Decryption utility is a Windows software that allows you easily and quickly to encrypt and decrypt selected files or folders on your computer using the latest industry standard strong encryption algorithms:AES (US Advanced Encryption Standard, secret-key encryption also known ...$50.00 -
36JSCAPE Load Tester 2.0
Example Uses - Simulate heavy user and/or network load against your file transfer services - Test file transfer services before releasing to a production environment - Identify and resolve stress points in file transfer services before they become a problem Feature Summary - Platform independent with installers for Windows, Linux, Solaris and Mac OS X - Schedule one time and recurring load testing sessions - Store connection details for use in future load testing sessions - Built-in reporting functionality to review test results - Ability to fine tune connection details controlling variables such as latency and number of concurrent connections - Support for public key and client ...$499.00
Buy -
37AimOne Video Joiner for Mac 1.02
AimOne video joiner Mac supports join video files in same or different formats to other format such as AVI, WMV, MPEG, VOB, MOV, 3PG, MP3, MP4, PSP, VCD, FLV, iPod and DVD. It includes all video encoders and decoders, so it can be used as AVI/MPEG ...$29.95
Buy -
38pCon.configurator 5.7
The pCon.configurator is a highly specialized product configuration system. As a module, the pCon.configurator can be seamlessly integrated with your other applications. The complexity of pCon.configurators functions necessary for processing product ... -
39SafeGuardA® PrivateDisk 1.0
SafeGuard PrivateDisk can be used as a standalone security solution or can be integrated in an existing PKI (public key infrastructure). In company-wide rollouts, SafeGuard PrivateDisk also supports the use of smartcards for strong authentication ... -
40ACOS5 SDK 2.1
It is specially designed for public-key based applications and RSA public-key cryptographic operations, which is essential in smart card PKI, digital signature and high level security requirements. ACOS5 provides a 32KB EEPROM for secure data storage.$119.00 -
41ASPEncrypt 2.4
AspEncrypt is an Active Server component that brings security to your applications through encryption. With AspEncrypt, you can encrypt data, send S/MIME-based secure mail, compute one-way hash values, generate and verify digital signatures, issue and ...$300.00 -
42aCrypt 2.0
Main features: -intra-company transmission of confidential company files and documents when no public key infrastructure exists. -inter-company transmission of confidential tenders or documents when no public key infrastructure exists or when the ... -
43Criticali Online Backup Manager 6.5
When you create a 'backup set' (ie a list of data to be backed up), you also specify an encryption key. This is the key that is used to 'scramble' your data BEFORE it gets sent to the backup servers. When the scrambled data is sent ...$8.00 -
44abcrypt file 1.1
AB Crypt File is a software to encrypt text files. It is possible, copy and paste to encrypt any file type. Whit AB Crypt File you can also find the files you encrypted with a history, choose between two methods of encryption. The Pro version allows ...$29.21 -
45Chilkat MIME 3.0
Create an manipulate MIME and S/MIME messages. -Navigate the MIME message tree structure via the NumParts property and GetPart(index) method. - Retrieve header field names and values. - Add header fields to a MIME message. -Add a detached (clear-text) ... -
46Issac-Web 5.9
Main features: - Real-time encryption of data being transmitted and received between the web server and browser using a one-time use symmetric key - Heighten security by using both the public key algorithm and symmetric key algorithm - Supports national ... -
47Smart Card Shell 3.7
It can be used to develop and test smart card applications, in particular applications integrated into a Public Key Infrastructure (PKI). It is a Java application using the OpenCard Framework supporting most smart cards compliant with ISO7816-4.Freeware -
48LICM 10.9
The application is freeware and very easy to use software for all www.Brandergy.com members and LinkedIn users at large. This group is especially for users of the LinkedIn Contacts Management Application developed by Arnnei Speiser of Mega AS Consulting ...Freeware -
49TC TimeStamp Client 3.0
TimeStampClient is designed to be a client software for Time-Stamp Protocol (TSP) defined by RFC 3161. Consists of single executable file. Supports TCP Socket Based Protocol. Supports Time-Stamp Protocol via HTTP/HTTPS. supports client certificate authentication ...Freeware -
50CryptBot e-Pen 2.0
CryptBot e-Pen™ was created for serving anybody who want to sign or write his/her comment on a web page/web-based document by hand. This application with an e-Pad hardware included will help you to create a signature or handwritten image and ...$565.00