|
||||||
|
||
|
Home > Des encryption decryption software |
Related keywords: encryption, file encryption, Encryption, decryption, encryption software, encryption system, email encryption, data encryption, hard disk encryption, Decryption |
|
|
1. | DevSolutions Crypt 1.0.1 (devsolutions.net) | ||
data or files using the latest industry standard strong encryption algorithms.It can be used to encrypt/decrypt strings,memory buffers,Blobs,Files and streaming data. For strong symmetric encryption algorithm,it supports the new Rijndael Algorithm , which is a Federal Information Processing Standard (FIPS) approved Advanced Encryption Standard (AES) .It also | |||
Updated: 2, 2006 | Rating: 22 | Author: Customer Cell | Size: 651 kb | Shareware Go to category: Development > Active X Similar programs | |||
2. | wodCrypt 1.2.7.0 (weonlydo.com) | ||
is a lightweight component that provides strong encryption for your applications. It provides supports for most common crypto algorithms, such as AES DES, TripleDES Blowfish Cast RC2 RC4 RC5 for symmetric encryption and decryption, RSA DSA for making and verifying signatures, and MD5 SHA1 for creating hashes. Working with Blobs | |||
Updated: 2, 2006 | Rating: 82 | Author: Kresimir Petric | Size: 1189 kb | Shareware Go to category: Development > Other Similar programs | |||
3. | venta-sign 2.0.0.142 (ventasoft.de) | ||
high-security signature and encryption with smartcards and soft token (PKCS#12). All german qualified Trustcenter supported. This programm is evaluated and certified by "ITSEC E2 high"(european security standard & Level). venta-sign is a suite for cryptography with 2 main components: venta-sign - shell extension (easy sign & encrypt) venta-container - application (sign & | |||
Updated: 9, 2005 | Rating: 0 | Author: F. Byszio | Size: 14489 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
4. | SafeBox Industry 1.0 (aidsoft.com) | ||
Industry is a new and powerfull file encryption solution. This application can also provide a strong protection, quite good compression, self-decrypting archives, good presentation (use skins form, splash screen), which may be used for secure distribution package.Features : Create Self-Decrypting (Auto Executable), Interface Customizable for Self Extraction, Add Signature inside | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | cryptlib 3.0 (download.componentspot.com) | ||
toolkit that allows even less experienced programmers to add strong encryption and authentication services to their programs, security features that are becoming more and more indispensable. The library attempts to hide the low-level details of encryption/decryption and authentication | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
6. | DriveCrypt 3.03a (drivecrypt.com) | ||
written back to the hard disk, it is automatically re-encrypted. The encryption/ decryption process is completely transparent to the user or any application program -the data is caught "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 3222 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
7. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
Encryption Workshop includes file and folder encryption and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
8. | PlexCrypt Compression-Encryption 3.1 (plexobject.com) | ||
protects documents and folders based on both asynchronous encryption based on Public-Key-Infrastructu re (PKI) and synchronous encryption based on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and | |||
Updated: 3, 2005 | Rating: 42 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
|
Home > Des encryption decryption software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|