Bitcoin Private Key Tool


Advertisement

AutoKrypt  v.11.10

Encryption methods include password based, secret key, public and private key, OpenPGP password, OpenPGP private and public key encryption. Includes key generators, and a key store to manage keys. Common tasks include encrypt, decrypt, copy, zip, unzip, ...

G.A.E.T. (Graphical Asymmetric Encryption Tool)  v.1.0

(Graphical Asymmetric Encryption Tool) demonstrates graphically the main functioning of encryption and decryption using a public-private key pair.1. Public Key Ring: We have incorporated a key ring concept which enables a user to choose from list of ...





Advertisement

Files Cipher  v.2.1.0.2

Files Cipher is a simple but powerful tool for protecting confidential information. The program uses an encryption algorithm with private key that was specially developed by FC Soft and has proven to be effective over many years of operation. Features ...

RSA Converter  v.1.1.0

A multi-platform tool to convert RSA private keys between SFM format (modulus, public exponent, private exponent) and CRT format, in both ways. This software enables you to convert an RSA private key from an SFM format (Straightforward Method, containing ...

Abylon CRYPTMAIL  v.11.00.2

Only the owner of the private key (HYBRID-System) or the correct password (SYMM-System) can open and read this email. For any other person the content is locked.
With the AddIn for Outlook (starting from Outlook 2000 / not Outlook Express) you can ...

PartSurfer  v.2. 3. 2028

The Engineering Part Surfer is a key tool in any engineering manager's toolchest. It simplifies, your ERP system making it Engineering friendly. As with all QBuild's offering's the PartSufer is designed to fit into your ERP system seamlessly.

AxsStrongBox  v.2 1

axsStrongBox is a COM component which provides strong, secure data encryption (public and private key). It can be easily integrated into Visual Basic, Visual C++, Delphi and VBScript applications.

StrongBox uses industry standard, public domain ...

QuickCrypt Library  v.2 50

A fast, highly optimized implementation of symmetric (private-key) encryption/decryption algorithms: DES, Triple DES (3DES), DESX, BLOWFISH, RIJNDAEL (AES - Advanced Encryption Standard), GOST (USSR/Russian Encryption Standard). It supports 5 modes of ...

Lock It  v.0.07 Beta

Lock It supports XML AdES, CMS AdES and PDF AdES BES/EPES formats and the private key could be used from the Smart Cards, MS Crypto API or soft file tokens. Signature algorithms: RSA, DSA and ECDSA with SHA256. Mini CA (New key button in LockIt) can be ...

EncryptorDecryptor  v.1.0.0.0

EncryptorDecryptor allows you to enter your own private key, for personal encyption. Give this key to another party, and with EncryptorDecryptor they can decrypt your text. Steps to encrypt your text: 1. enter your own Shared Secret Key. 2. enter your ...

Bloppy  v.1.0

Bloppy Blowfish PHP (En/De)crypter can crypt, with a private key, text messages or files, send it via e-mail and decrypt it. You can inject a crypted message into any kind of file (like JPEG image) and send it via e-mail.

TEncryption  v.1.0

Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html ...

MSSQL to MySQL Data Migration Tool  v.8.0.5.5

If you want to upgrade your MSSQL server to MySQL server but not done due to data lose in converting process, so your search will be end. We provide complete migrate solution for data conversion which convert data from MSSQL to MySQL. Solution support ...

Emsa EZ Encryption Tool  v.1.0.0046

EMSA EZ Encryption Tool is a simple encryption program for Windows. This program uses the Blowfish algorithm to encrypt files or text chunks. This algorithm is a strong encryption algorithm using a private key, therefore keeping your data safe from prying ...

CommuniCrypt Standard Edition

CommuniCrypt is a new tool for high secured realtime communication via LAN and Internet. It works like a messenger or a chat tool, but the complete data transfer between both machines are highly encrypted through Public-Key-Encryption with RSA encryption ...

Pages : 1 | 2 >
Newest Reviews