Sha1 Hash Function Fortran Source


Advertisement

.netshrink  v.2.6

Password protection uses verification based on SHA256 hash function and 256 bit AES / Rijndael encryption.

NPE File Analyzer  v.1.1.2.1

NPE can also generate MD5 hash, SHA1 hash and CRC32 hash of a file. It has full support for PEiD plugins and it has also a built-in hex editor that allows you to edit a file.





Advertisement

Device Seizure  v.6.6



Features include: Comprehensive easy-to-use interface, USB and serial support, Comprehensive data acquisition of text messages, address books, call logs, and more, Recovers deleted data, Verification of file integrity with use of MD5 and SHA1 hash values, Built-in ...

MSCCrypto for Windows  v.2.0

It includes collection of the best encryption and hashing algorithms:
- RSA public key algorithm (512/1024/2048 bits key size)
- AES symmetric block algorithm (128/192/256 bits key size)
- Blowfish symmetric block algorithm (64 to 448 bits key size)
- Cast5 (Cast 128) symmetric block algorithm (128 bits key size)
- TripleDES symmetric block algorithm (192 bits key size)
- Twofish symmetric block algorithm (128/192/256 bits key size)
- MD5 hash (128 bits hash)
...

J4L PDF digital signature  v.1.0

The signature created will use the algorithms RSA signature, SHA1 hash and PKCS7 encoding. It works on Java 1.5 or later.

AutoRunnerX  v.1. 2. 2006

A hash function for programs is integrated to detect manipulations by computer viruses. If you always open the same programs, Word and Excel files for example, after you put your flash drive or hard disk, the autostart extension - AutoRunnerX - is very ...

CryptoUP  v.3.0.0.0

The hash function each file can be signed. Any substantial alteration falls immediately afterwards.

DuMP3 for Linux GTK PPC  v.0.3.2

DuMP3 can find files that are similar but not exact duplicates: * Binary files are compared by SHA1 hash (configurable to any MD hash) * Text files that were changed by addition or deletion (2 fingerprint algorithms available) * Pictures in different ...

Gnasher  v.0.2

SHA1 hash files and the missing pom metadata files for dependencies are created if missing.

Total Manager for Mac  v.3.7.0



* View the Hash Value of files: MD4 Hash, MD5 Hash, MDC2 Hash, SHA Hash, SHA1 Hash, SHA256 Hash, SHA512 Hash, SHA224 Hash, SHA384 Hash, RMD 160 Hash

* Support Numerous File Formats:
JPG, JPEG, JPE, JFIF, JPS, PNG, GIF, JP2, JPF, TIF, DNG, CR2, MOS, FFF, 3FR, NEF, NRW, PEF, SRW, SRF, SR2, ARW, ERF, DCR, TIFF, FAX, G3, JFX, JFAX, EFX, ICNS, CRW, RAF, RAW, RW2, RWL, MRW, ORF, PSD, ICO, BMP, XBM, CUR, TGA, SGI, RGB, PNTG, PNT, MAC, EXR, HDR, MPO, QTIF, QTI, FPX, FPIX, EPS, EPI, EPSF, EPSI, PS, PICT, PCT, PIC, TARGA

* ...

IAntiSpy  v.1.0

Your information is safe, iAntiSpy does not actually know which domain you are requesting - all of our databases and the request itself is transformed using a one-way cryptographic hash function before processing. The only place the actual requested ...

Digital-Fever Hash Bruteforcer  v.1.0.1

Digital-Fever Hash Bruteforcer is an application that you can use to decode MD5, MD2 and SHA1 hashes using brute force. All you have to do is input the hash and select its type then start the task. Digital-Fever Hash Bruteforcer supports custom charsets ...

Hash-Drop  v.1.1.2000

Hash-Drop it's a small utility for get the MD5, SHA1 or SHA256 hash of any file. Simply drop a file into the app to obtain the hash.

Quick Hash  v.1.2.1

Quick Hash is an application that allows rapid hashing of text strings, single files, recursive directory hashing of thousands of files. All output hashes that are generated using the program can easily be copied to your system's clipboard. Features: ...

Hash Compare  v.1.5

Hash Compare is the FREE File Hash comparison tool. It performs Hash based Integrity Comparison using any of the the popular hash algorthms such as MD5, SHA1 or SHA256. To make the task easier and quicker, it also supports the 'File Drag & Drop' feature.

Pages : < 1 | 2
Newest Reviews