Encryption Algorithms Delphi


Advertisement

Yaz-Limited and Free  v.1.0

Yaz-Limited and Free is a software tool which integrates several encryption algorithms. You may use this software application in order to encrypt your messages.
Encryption algorithm Yaz (Repetition algorithm) is the result of the development of algorithms ...

Lark File Encryption  v.1 21

Lark File Encryption is a powerful file encryption tools. The tool provides you five encryption algorithms ( AES, MD5, DES, SHA, ECC) with a fast encryption speed and no file format and size limits.
Once your data has been protected there is no way ...





Advertisement

Chilkat AES & RSA Encryption Component  v.2. 2. 2000

NET is an advanced encryption component that offers both RSA public-key

encryption with digital signatures as well as symmetric encryption algorithms including

AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily ...

Chilkat Encryption .NET Component  v.2. 2. 2000

NET is an advanced encryption component that offers both RSA public-key

encryption with digital signatures as well as symmetric encryption algorithms including

AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily ...

Paranoia Text Encryption for PC  v.12R5E



Texts are encrypted using strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro Version) ciphers are available.

A ...

Advanced Encryption Plugin for Explorer  v.5.61

Encryption Plugin for Windows Explorer provides easy file encryption support for standard Windows Explorer. It adds new Encrypt/Decrypt/Shred/Create SFX commands to the context menu of Windows Explorer.
AEPE introduces dozen of strong encryption ...

COMODO Disk Encryption  v.1.2.114847.152

Comodo Disk Encryption is a security tool for encrypting your disks. It allows you to encrypt your hard drives or partitions so that no one but you can access them. The encryption of your disks can be carried out using several encryption algorithms. The ...

Encrypt Files

It is fast and lightweight desktop software that supports 13 advanced encryption algorithms, contains intergated shredder and makes files hidden after encryption. With Encrypt Files you can encrypt and password protect both files and folders.

IMCrypto Free

The program is compatible with most of the widely spread instant messengers and uses in its work one of the strongest and most reliable public key encryption algorithms RSA. You can start secure conversation with other person right after the program ...

IMCrypto Pro

The program is compatible with most of the widely spread instant messengers and uses in its work one of the strongest and most reliable public key encryption algorithms RSA. You can start secure conversation with other person right after the program ...

Crococrypt Portable  v.0.9b

Crococrypt is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool ...

WinSesame  v.10 3

WinSesame comes with 6 encryption algorithms, including 3 special algorithms with limitless key length and 1 algorithm allowing the use of signature files.
WinSesame is the most powerful encryption software to encrypt and password protect all types ...

Secure Archive  v.1.0.5.8

Secure Archive is a new generation of encryption software. It provides multiple encryption algorithms, variable compression levels, secure delete and Self-Extraction. It was created to give users an easy to use yet powerful file based security tool and ...

PSYBEncrypter  v.2 7

PSYB Encrypter - Encryption Software designed to protect all your files safely and securely with strong and secure encryption algorithms. Aimed at those with large amounts of pictures, photographs, images video or movie clips that they wish to keep private ...

SpeakFreely  v.2.1

It provides all the commonly used Internet encryption algorithms without certificates or signatures. By selecting email addresses which should be encrypted secure email connections can be created over the Internet or intranet.

Pages : 1 | 2 >
Newest Reviews