Cryptographic Hash Utilities


Advertisement

Febooti fileTweak Hash and CRC  v.3.0

With Febooti fileTweak Hash & CRC it is possible to compute most popular file hash checksums (such as MD5, CRC32, SHA-1 and other) in order to verify file integrity (if cryptographic hash value is provided) or to supplement file with checksum, thus creating ...

Cobynsofts Hash Calculator  v.1.1

Used to detect file tampering and duplication Cobynsoft's Hash Calculator is a freeware utility for calculating MD5 and SHA-1 cryptographic hash values for single files or for multiple files by selecting entire folders. The tool will output the file(s) ...





Advertisement

WinHasher  v.1.6.0.43

WinHasher is a free, Open Source cryptographic hash or digest generator written in C# using Microsoft's .NET 2.0 Framework. It can be used to verify file download integrity, compare two or more files for modifications, and to some degree generate strong, ...

VSCryptoHash  v.1.3.3.379

VSCryptoHash is cryptographic hash calculation software. Simply drag and drop files (or type the text) in this calculator and hash string for the files (or for entered text) will be immediately displayed. It is Great tool for network administrators and ...

VSCryptoHash 64-bit  v.1.3.3.379

VSCryptoHash 64-bit is cryptographic hash calculation software. Simply drag and drop files (or type the text) in this calculator and hash string for the files (or for entered text) will be immediately displayed. It is Great tool for network administrators ...

OpenSSL Hasher  v.1.0.0

OpenHash use the MDC-2 algorithm to calculate the hash of a string. It's easy to see that the function validates against a known test vector. Create cryptographic hash value with this tool. OpenSSL Hasher is an easy-to-use software developed for .NET ...

EasyMD5Calculator  v.1.0.0.1

Calculate the MD5 hash of a given file or text. EasyMD5Calculator can compute the MD5 hash of files. MD5 is a popular cryptographic hash function with a 128-bit hash value. MD5 hashes are typically represented as a sequence of 32 hexadecimal digits. This ...

ACryptoHash.Net  v.rc

Pure managed C# implementation of well-known cryptographic hash functions such as SHA-family (SHA0, SHA1, SHA2), MD-family (MD2, MD4, MD5), RIPEMD, Tiger, Haval, Snefru and others.

Cryptnos  v.1.3.2

NET Framework for generating powerful, unique, yet repeatable passphrases using cryptographic hashes. Its original intended use was for website authentication, but it can be used for any purpose where powerful passphrases are required or encouraged. Cryptnos ...

WinMd5Sum  v.1.0.1.55 Revision 4

Whats an MD5 Sum? An MD5 sum is a cryptographic hash used to verify the integrity of files. So, when you download a file, you can check what the publisher says the MD5 sum is and compare it to the MD5 sum of the file you have
You obtain the MD5 checksum ...

Proto Balance  v.1.15

Random, based on a cryptographic hash of the clients IP address
The last algorithm ensures that a particular client will always connect to the same instance even if the Client Affinity feature is disabled. This algorithm is useful when you would ...

MarshallSoft C/C++ AES Library  v.2.0


- Supports SHA-256 cryptographic hash algorithm.
- Does random byte data generation.
- Allows concurrent encryption/decryption threads.
- Validated using "known answer tests" published by the National Institute of Standards and Technology.

MarshallSoft Visual Basic AES Library  v.2.0


- Supports SHA-256 cryptographic hash algorithm.
- Does random byte data generation.
- Allows concurrent encryption/decryption threads.
- Validated using "known answer tests" published by the National Institute of Standards and Technology.

MarshallSoft Visual FoxPro AES Library  v.2.0


- Supports SHA-256 cryptographic hash algorithm
- Does random byte data generation.
- Allows concurrent encryption/decryption threads.
- Validated using "known answer tests" published by the National Institute of Standards and Technology.

MarshallSoft Visual dBase AES Library  v.2.0


- Supports SHA-256 cryptographic hash algorithm.
- Does random byte data generation.
- Allows concurrent encryption/decryption threads.
- Validated using "known answer tests" published by the National Institute of Standards and Technology.

Pages : 1 | 2 >
Newest Reviews