|
||||||
|
||
|
Home > Twofish software |
Related keywords: secure email encrypted e mail encryption crypto online privacy rsa twofish block cipher stream ciphe |
|
|
21. | Crypto Anywhere 1.1 (bytefusion.com) | ||
strong encryption algorithms based on RSA public key encryption, the Twofish block cipher and the ISAAC random number generator. Crypto Anywhere e-mail is compatible with SecExMail client based and SecExMail Gate server based encryption. Crypto Anywhere is secure email on the move ! Crypto Anywhere is | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 1301 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
22. | Crypto Anywhere - OpenPGP Edition 2.0 (bytefusion.com) | ||
strong encryption algorithms based on RSA public key encryption, the Twofish block cipher, ISAAC random number generator and OpenPGP. Secure Email .Standalone or integrated with Outlook Express. Can decrypt and encrypt messages to friends using PGP, OpenPGP, SecExMail and many more. Crypto Anywhere allows you to make a travel floppy which can be used in internet cafe's or at | |||
Updated: 9, 2005 | Rating: 86 | Author: Bytefusion Sales | Size: 2987 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
23. | SecExMail Home 1.51 (bytefusion.com) | ||
and a secure 384-bit cipher, incorporating the AES candidate Twofish algorithm; SecExMail features PGP-style e-mail keys, but without the dependence on e-mail-software-specific plug-ins. The software runs unobtrusively as a relay agent in the system tray on your desktop and actively filters messages between your e-mail client and your mail server, encrypting and decrypting mail | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 2613 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
24. | SecureCRT 4.1.2 (promaxum.com) | ||
SSH2 protocols. SSH2 support provides AES, 3DES, RC4, Blowfish, and Twofish ciphers, with password authentication, public-key authentication, and Kerberos v5 authentication via GSSAPI. Port forwarding allows redirecting TCP/IP applications over an encrypted channel. SecureCRT is ideal for connecting to | |||
Updated: 9, 2005 | Rating: 0 | Author: VanDyke Software Inc. | Size: 4103 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
25. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
RC2, DIAMOND2, TEA, SAFER, 3-WAY, GOST, SHARK, SQUARE, SKIPJACK, TWOFISH, MARS, SERPENT. The latest version has support for RSA algorithm and Public-Private Key cryptography. One key is kept secret and is referred to as the private key while the other is made available to others and is called the public key since anyone can access this key. These keys are large | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
26. | Advanced Encryption Plug-In Pro for Windows Explorer 4.0.3 (secureaction.com) | ||
Advanced Encryption Standard (Rijndael), Blowfish, DES, CAST, RC2, Twofish, Diamond2, Mars, Gost, Tea, Safer and so on (17 algorithms). All algorithms are industrial encryption standards. Shredding (Safe removing files from your system). The shredded files will never be restored even with using Norton | |||
Updated: 2, 2006 | Rating: 25 | Author: SecureAction Research, LLC | Size: 879 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
27. | BestCrypt 7.20.2 (jetico.com) | ||
"on-the-fly". Strong encryption algorithms Rijndael (AES), Blowfish,Twofish, GOST, DES. Time-out and Hot Key options. The wiping utility is included allowing you to wipe files, free space, swap file and file slacks that nobody can restore your files later. This version includes support for Windows XP, swap file encryption, and a "hidden" container feature. BestCrypt is professionally | |||
Updated: 9, 2005 | Rating: 55 | Author: Jetico Inc. | Size: 5004 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
28. | DigiSecret 2.0 (tamos.com) | ||
in the world: CAST (128-bit key), Blowfish (448-bit key), Twofish (256-bit key), and Rijndael (also known as AES, 256-bit key). The program provides the option to choose the interface language: English, German, French, Spanish, or Russian. An application for strong file encryption, compression, and file sharing (peer to peer). It utilizes time-proven encryption algorithms for | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Riedel | Size: 2573 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
29. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is much safer. Of course, if you are | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
30. | Masker 7.0.6 (softpuls.com) | ||
encryption algorithms. (CAST 128-bit, BLOWFISH, RIJNDAEL 256-bit, TWOFISH) The encrypted files will then be hidden within a carrierfile. MASKER is able to compress files in order to reduce size of the carrier file. As a carrier file you can use: image files (bmp, gif, jpg, tif); audio files (wav, mid, snd, mp3); program files (exe, dll, ocx); video files (avi, mov, mpg, asf); For | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Twofish software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|