register at Windows8Downloads.com Windows 8 Downloads RSS add Windows 8 Downloads to favorites

Cryptographic Windows 8 downloads - Free Download Windows 8 Cryptographic - page 2 - Windows 8 Downloads

Page: « Previous ... 1 2 3 4 ... Next » (4 pages)
Results: 21 - 40 of 70
Sort by:  relevance | title | downloads | rating | date
BestCrypt
... those areas, I'm willing to believe that their cryptographic implementations are equally meticulous and well executed. In conclusion, BestCrypt ...
Price: FREE / Trialware
WinHasher
WinHasher is a free, Open Source cryptographic hash or digest generator written in C# using ... to some degree generate strong, unique passwords. Cryptographic hashing is readily available on many computer operating ...
Price: FREE / Open Source
BoxCryptor
BoxCryptor is a cryptographic virtual harddisk that encrypts all data on-the-fly using the AES-256 standard. Encrypted data is stored in ...
Price: $48.00 / Demo
Hash Codes screenshot
Hash Codes is a simple and easy to use application designed to enable users to hash data from keyboard, file or ...
Price: FREE / Open Source
Python Encryption Library x64 screenshot windows 8 downloads pick
Python encryption library x64 for encrypting and decrypting both strings and binary data. Python Encryption Library implements symmetric encryption algorithms: Rijndael, ...
Price: $149.00 / Trialware
BestSync Portable windows 8 downloads pick
... a folder with a ZIP file, support AES cryptographic algorithm to protect the zip file with password. Synchronize Outlook (mail, ...
Price: $19.95 / Trialware
Aloaha Timestamping Authority
The Aloaha Time-Stamping Authority is a cryptographic time stamping application that enables organizations or individuals to apply tamper-evident digital Seals ...
Price: FREE / Freeware
BizCrypto for BizTalk Server
... PDF, XML, ZIP pipelines let you perform various cryptographic operations such as encryption, decryption, digital signing (including timestamping) and signature ...
Price: $1 066.00 / Shareware
LuJoSoft Checksum
... SHA-1 SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and ...
Price: FREE / Freeware
BizCrypto for SQL Server
... PKI, PDF, XML tasks let you perform various cryptographic operations such as encryption, decryption, digital signing (including timestamping) and signature ...
Price: $1 066.00 / Shareware
xCELLencrypt screenshot
... encryption standard (AES) 256 bit encryption via Microsoft's cryptographic service provider (CryptoAPI). Users may elect to encrypt with a password ...
Price: $9.99 / Shareware
Devart SecureBridge
... TCP traffic using SSH or SSL protocols and Cryptographic Message Syntax that provide authentication for client and ... supported * Robust protection against different kinds of cryptographic attacks * High performance * Ability to work ...
Price: $99.95 / Shareware
Inky
... spear phishing. Inky assigns each employee a unique cryptographic key, and that key is only ever provisioned into that employee’s ...
Price: FREE / Freeware
File Checksum Calculator
A standalone utility that generates and verifies cryptographic hashes in MD5, SHA-1 and SHA-256. Cryptographic hash functions are commonly used to guard against ...
Price: FREE / Freeware
Gpg4win windows 8 downloads pick
... Another goal is to support both relevant cryptographic standards, OpenPGP and S/MIME in a unified way. Gpg4win is ...
Price: FREE / Open Source
Babel Obfuscator
Another important function that Babel Obfuscator comes with is the overloaded renaming option, which allows you to rename all the methods ...
Price: FREE / Trialware
SQLCipher
... new vulnerabilities and incorporate the latest advancements in cryptographic techniques. In summary, SQLCipher by ZETETIC LLC is an exceptional ...
Price: FREE / Freeware
Page: « Previous ... 1 2 3 4 ... Next » (4 pages)
Results: 21 - 40 of 70
Sort by:  relevance | title | downloads | rating | date


Similar cryptographic for Windows 8 keywords

cryptographic software $o r cryptographic software 0 r cryptographic algorithm cryptographic cryptographic hash functions cryptographic software 20 r cryptographic standards cryptographic hash cryptographic key generation cryptographic software 40 r cryptographic software cryptographic software o r

Advertise Link To Us Privacy Policy Contact Us