Private Key Bitcoin


Advertisement

AutoKrypt  v.11.10

Encryption methods include password based, secret key, public and private key, OpenPGP password, OpenPGP private and public key encryption. Includes key generators, and a key store to manage keys. Common tasks include encrypt, decrypt, copy, zip, unzip, ...

Files Cipher  v.2.1.0.2

The program uses an encryption algorithm with private key that was specially developed by FC Soft and has proven to be effective over many years of operation. Features include a wide scope of application, high performance rate and strong encryption.
...





Advertisement

Abylon CRYPTMAIL  v.11.00.2

Only the owner of the private key (HYBRID-System) or the correct password (SYMM-System) can open and read this email. For any other person the content is locked.
With the AddIn for Outlook (starting from Outlook 2000 / not Outlook Express) you can ...

AxsStrongBox  v.2 1

axsStrongBox is a COM component which provides strong, secure data encryption (public and private key). It can be easily integrated into Visual Basic, Visual C++, Delphi and VBScript applications.

StrongBox uses industry standard, public domain ...

QuickCrypt Library  v.2 50

A fast, highly optimized implementation of symmetric (private-key) encryption/decryption algorithms: DES, Triple DES (3DES), DESX, BLOWFISH, RIJNDAEL (AES - Advanced Encryption Standard), GOST (USSR/Russian Encryption Standard). It supports 5 modes of ...

G.A.E.T. (Graphical Asymmetric Encryption Tool)  v.1.0

(Graphical Asymmetric Encryption Tool) demonstrates graphically the main functioning of encryption and decryption using a public-private key pair.1. Public Key Ring: We have incorporated a key ring concept which enables a user to choose from list of ...

RSA Converter  v.1.1.0

A multi-platform tool to convert RSA private keys between SFM format (modulus, public exponent, private exponent) and CRT format, in both ways. This software enables you to convert an RSA private key from an SFM format (Straightforward Method, containing ...

Lock It  v.0.07 Beta

Lock It supports XML AdES, CMS AdES and PDF AdES BES/EPES formats and the private key could be used from the Smart Cards, MS Crypto API or soft file tokens. Signature algorithms: RSA, DSA and ECDSA with SHA256. Mini CA (New key button in LockIt) can be ...

EncryptorDecryptor  v.1.0.0.0

EncryptorDecryptor allows you to enter your own private key, for personal encyption. Give this key to another party, and with EncryptorDecryptor they can decrypt your text. Steps to encrypt your text: 1. enter your own Shared Secret Key. 2. enter your ...

Bloppy  v.1.0

Bloppy Blowfish PHP (En/De)crypter can crypt, with a private key, text messages or files, send it via e-mail and decrypt it. You can inject a crypted message into any kind of file (like JPEG image) and send it via e-mail.

TEncryption  v.1.0

Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html ...

CommuniCrypt Standard Edition

It works like a messenger or a chat tool, but the complete data transfer between both machines are highly encrypted through Public-Key-Encryption with RSA encryption algorithm (RSAES-OAEP). The key length of public and private key may between 338 and ...

VanDyke ClientPack for Windows and UNIX  v.7.2.5

VanDyke ClientPack is a suite of tools for automating file transfer, shell, and public-key administration tasks, saving you time on routine administration and configuration tasks. VRALib, a key component of the ClientPack, is a COM and .NET API that ...

A2DCrypt 2048 bits Encryption

Very fast, A2DCrypt ensures protection
A2DCrypt 2048 Bits Encryption is file encryption software taking key length of 2048 bits. Armed with a simple interface to take control, the handling is easy and accessible to all. Compatible, lightweight, fast, ...

SecureFile  v.2.0

SecureFile is an encryption and compression program that allows you to encrypt and decrypt files using symmetric key and asymmetric key mechanism. It creates a self-decryption archive which can be decrypted at the other end without any dependencies.
...

Pages : 1 | 2 >
Newest Reviews