

Advertisements

Advertisements


Related searches
Size :912K
Demo HsCipherSDK Encryption Library 1.4User Rating :(Review : 0) OS: WindowsHsCipherSDK is an Encryption Library providing an API to a suite of symmetric key cryptographic algorithms and one way hash digital signature algorithms. a CAST5)  RFC 2144 * Blowfish algorithm * Twofish algorithm * MD5 message digest algorithm  RFC 1321 * SHA1 (Secure Hash Algorithm)  RFC 3174 * SHA256 (Secure Hash Algorithm)  FIPS 1802 * SHA512 (Secure Hash Algorithm)  FIPS 1802 * Whirlpool ISO/IEC 101183 HsCipherSDK includes s standard DLL for use from C / C++. standard DLL for use from Visual Basic or any other languthat can use the standard dll. HsCipherSDK allows the calling user application to perform the following operations: * Encrypt and decrypt memory buffers with selected algorithm and key * Encrypt and decrypt disk files with selected algorithm and key * Digitally sign buffers using one of selected hashing algorithms * Digitally sign disk files using one of selected hashing algorithms API SUMMARY: * HsCipherGetErrorStr * HsCipherHexBuf2Bin * HsCipherBufBin2Hex * HsCipherBufferEncrypt * HsCipherBufferDecrypt * HsCipherFileEncrypt * HsCipherFileDecrypt * HsCipherBufferHashInit * HsCipherHashNextBlock * HsCipherHashGetResult * HsCipherHashFullBuffer * HsCipherHashFile. .
Size :913K
Demo HsCipherSDK Encryption Library 1.5User Rating :(Review : 0) OS: WindowsHsCipherSDK is an Encryption Library providing an API to a suite of symmetric key cryptographic algorithms and one way hash digital signature algorithms. a CAST5)  RFC 2144 * Blowfish algorithm * Twofish algorithm * MD5 message digest algorithm  RFC 1321 * SHA1 (Secure Hash Algorithm)  RFC 3174 * SHA256 (Secure Hash Algorithm)  FIPS 1802 * SHA512 (Secure Hash Algorithm)  FIPS 1802 * Whirlpool ISO/IEC 101183 HsCipherSDK includes s standard DLL for use from C / C++. standard DLL for use from Visual Basic or any other languthat can use the standard dll. HsCipherSDK allows the calling user application to perform the following operations: * Encrypt and decrypt memory buffers with selected algorithm and key * Encrypt and decrypt disk files with selected algorithm and key * Digitally sign buffers using one of selected hashing algorithms * Digitally sign disk files using one of selected hashing algorithms API SUMMARY: * HsCipherGetErrorStr * HsCipherHexBuf2Bin * HsCipherBufBin2Hex * HsCipherBufferEncrypt * HsCipherBufferDecrypt * HsCipherFileEncrypt * HsCipherFileDecrypt * HsCipherBufferHashInit * HsCipherHashNextBlock * HsCipherHashGetResult * HsCipherHashFullBuffer * HsCipherHashFile. .
Size :913K
Demo HsCipherSDK Encryption Library 1.6User Rating :(Review : 0) OS: WindowsHsCipherSDK is an Encryption Library providing an API to a suite of symmetric key cryptographic algorithms and one way hash digital signature algorithms. a CAST5)  RFC 2144 * Blowfish algorithm * Twofish algorithm * MD5 message digest algorithm  RFC 1321 * SHA1 (Secure Hash Algorithm)  RFC 3174 * SHA256 (Secure Hash Algorithm)  FIPS 1802 * SHA512 (Secure Hash Algorithm)  FIPS 1802 * Whirlpool ISO/IEC 101183 HsCipherSDK includes s standard DLL for use from C / C++. standard DLL for use from Visual Basic or any other languthat can use the standard dll. HsCipherSDK allows the calling user application to perform the following operations: * Encrypt and decrypt memory buffers with selected algorithm and key * Encrypt and decrypt disk files with selected algorithm and key * Digitally sign buffers using one of selected hashing algorithms * Digitally sign disk files using one of selected hashing algorithms API SUMMARY: * HsCipherGetErrorStr * HsCipherHexBuf2Bin * HsCipherBufBin2Hex * HsCipherBufferEncrypt * HsCipherBufferDecrypt * HsCipherFileEncrypt * HsCipherFileDecrypt * HsCipherBufferHashInit * HsCipherHashNextBlock * HsCipherHashGetResult * HsCipherHashFullBuffer * HsCipherHashFile. .
Size :1,158K
Demo HsCipherSDK Encryption Library 2.0User Rating :(Review : 0) OS: WindowsHsCipherSDK is an Encryption Library providing an API to a suite of symmetric key cryptographic algorithms and one way hash digital signature algorithms. a CAST5)  RFC 2144 * Blowfish algorithm * Twofish algorithm * MD5 message digest algorithm  RFC 1321 * SHA1 (Secure Hash Algorithm)  RFC 3174 * SHA256 (Secure Hash Algorithm)  FIPS 1802 * SHA512 (Secure Hash Algorithm)  FIPS 1802 * Whirlpool ISO/IEC 101183 HsCipherSDK includes s standard DLL for use from C / C++. standard DLL for use from Visual Basic or any other languthat can use the standard dll. HsCipherSDK allows the calling user application to perform the following operations: * Encrypt and decrypt memory buffers with selected algorithm and key * Encrypt and decrypt disk files with selected algorithm and key * Digitally sign buffers using one of selected hashing algorithms * Digitally sign disk files using one of selected hashing algorithms API SUMMARY: * HsCipherGetErrorStr * HsCipherHexBuf2Bin * HsCipherBufBin2Hex * HsCipherBufferEncrypt * HsCipherBufferDecrypt * HsCipherFileEncrypt * HsCipherFileDecrypt * HsCipherBufferHashInit * HsCipherHashNextBlock * HsCipherHashGetResult * HsCipherHashFullBuffer * HsCipherHashFile. .
Size :225K
Shareware MSCCrypto for Linux 2.0User Rating :(Review : 0) OS: Linux It includes collection of the best encryption and hashing algorithms:  RSA public key algorithm (512/1024/2048 bits key size)  AES symmetric block algorithm (128/192/256 bits key size)  Blowfish symmetric block algorithm (64 to 448 bits key size)  Cast5 (Cast 128) symmetric block algorithm (128 bits key size)  TripleDES symmetric block algorithm (192 bits key size)  Twofish symmetric block algorithm (128/192/256 bits key size)  MD5 hash (128 bits hash)  SHA1 hash (160 bits hash)  Ripemd hash (160 bits hash)  32bit CRC checksum algorithm  24bit CRC checksum algorithm Additionally.
Size :819K
Shareware HsCipherSDK Encryption Library 1.2User Rating :(Review : 0) OS: WindowsHsCipherSDK is an Encryption Library providing an API to a suite of symmetric key cryptographic algorithms and one way hash digital signature algorithms. a CAST5)  RFC 2144 * Blowfish algorithm * Twofish algorithm * MD5 message digest algorithm  RFC 1321 * SHA1 (Secure Hash Algorithm)  RFC 3174 * SHA256 (Secure Hash Algorithm)  FIPS 1802 HsCipherSDK includes s standard DLL for use from C / C++. Visual Basic or any other language supporting activeX. HsCipherSDK allows the calling user application to perform the following operations: * Encrypt and decrypt memory buffers with selected algorithm and key * Encrypt and decrypt disk files with selected algorithm and key * Digitally sign buffers using one of selected hashing algorithms * Digitally sign disk files using one of selected hashing algorithms API SUMMARY: * HsCipherGetErrorStr * HsCipherHexBuf2Bin * HsCipherBufBin2Hex * HsCipherBufferEncrypt * HsCipherBufferDecrypt * HsCipherFileEncrypt * HsCipherFileDecrypt * HsCipherBufferHashInit * HsCipherHashNextBlock * HsCipherHashGetResult * HsCipherHashFullBuffer * HsCipherHashFile. .
Size :651K
Shareware DevSolutions Crypt 1.0.1User Rating :(Review : 0) OS: WindowsDevSolutionsCrypt library is a powerful and easy to use cryptographic ActiveX and DLL component for Windows developers that allows applications to encrypt/decrypt data or files using the latest industry standard strong encryption algorithms. For strong symmetric encryption algorithm. it supports the new Rijndael Algorithm . Blowfish algorithms. DevSolutionsCrypt component is designed to guard your client''s or application''s sensitive information with powerful byte/binary encryption algorithms. .
Size :1,460K
Shareware SALVADOR 2.7.1User Rating :(Review : 0) OS: Windows Includes 13 algorithms of enciphering (Blowfish. 21 algorithm of formation of the electronicdigital signature (MD. etc. ) and 3 algorithms of compression (LZ77.
Size :381K
Freeware FileEncryptor 1.0.3.0User Rating :(Review : 0) OS: WindowsFileEncrypter is a small freeware utility that is capable of encrypting any file on any media storage with the officially recognized encryption algorithm  AES (Rijndael). The key length of the algorithm may vary from 128 to 256 bit to ensure the maximum protection of encrypted information. The use of FileEncryptor will help you to keep all important files safe no matter what happens because AES encryption algorithm has been proven to be unbreakable. .
Size :1,062K
Shareware Resize Pilot 1.00User Rating :(Review : 0) OS: Windows This photo resizing program has a unique algorithm for image enlarging. The enlarging algorithm is most productive for focused images. Sharpness of the image may slightly improve as a secondary effect of applying the algorithm. .
Size :23K
Freeware Lexicographic Order Algorithms 1.0User Rating :(Review : 0) OS: WindowsAlgorithms. source code calculate lexicographic order of combinations; compiled program and source code are included. The source code uses two algorithms to find the index or rank for a combination; or find combination for given rank. The first algorithm was discovered by B. The second algorithm was created by Ion Saliu (2001). Both lexicographical algorithms are very fast; the calculations are almost instantaneous. The algorithms can be expanded to cover even more complex sets. algorithms.
Size :1,212K
Shareware File Own Guard 2.0User Rating :(Review : 0) OS: WindowsFile Own Guard designed for strong file encryption with multichoice compression on the fly by a range of cryptoalgorithms (AES. secure file removal (shredding) using one of the eight special algorithm (DoD. VSITR; Bruce Schneier algorithm; Peter Gutmann algorithm;). which will protect your valuable data. File Own Guard allows you to choose any of wide range of cryptoalgorithms so that you may be firmly convinced that the information won t be accessed without your permission. File Own Guard also achieves a secure removal of your sensitive data by overwriting the file before deleting it using one of the eight special algorithm (DoD. and even more!. Our software uses the newest and the strongest algorithms and methods to make your files and data secure. .
Size :8,908K
Freeware Magic Inpainter 2.1User Rating :(Review : 0) OS: Windows The tool uses unique context based image restoration algorithm. The purpose of the inpainting algorithm is to restore noisy regions of the image in a natural way. The algorithm works better for textures but it had also been tested successfully on various kind of photos. The algorithm preserves the background texture pattern.
Size :2,770K
Shareware WebCab Optimization for Delphi 2.6User Rating :(Review : 0) OS: Windows Specialized Simplex Linear programming algorithm. including sensitivity analysis with respect to object functions coefficients or linear boundaries using a duality or direct approach. This suite includes the following features: Local UniDimensional 18 Distinct Algorithms involving different Location and Bracketing Algorithms. Global UniDimensional  Accurate high level algorithms for continuous and derivable object functions. Local MultiDimensional  General Functions: Downhill simplex method of Nelder and Mead. BroydenFletcherGoldfarbShanno Global Multidimensional  Simulated annealing technique applied to local algorithm. Constrained optimization  Linear: Rosen''s gradient projection algorithm Linear programming  Simplex algorithm.
Size :1,024K
Shareware Ultra Crypto Component 2.0.2011.201User Rating :(Review : 0) OS: WindowsNet ***Support standard encryption and decryption algorithm like RSA. AES256. The encryption and decryption algorithm is implemented by underline crypto service providers. So the algorithms supported will be increased as the security requirements advance. ***Support standard hash algorithm like MD5. SHA Ultra Crypto Component also supports the typical hash algorithm like MD2. the hash algorithm can be combined with a private key to create digital signature to futher improve security. Support encryption and decryption of file Support encryption and decryption of string Support encryption and decryption of memory buffer Support calculation of hash on string. file or memory buffer Support digital signature creation and validation Support state of art crypto algorithm like RC2.
Size :24,430K
Shareware Xceed Encryption Library 1.1User Rating :(Review : 0) OS: WindowsXceed Encryption Library is an ActiveX component that allows Windows applications to encrypt and decrypt data using the latest industry standard strong encryption algorithms. For traditional strong encryption. the library supports the newly adopted AES (US Advanced Encryption Standard) secretkey encryption algorithm (Rijndael). 192 or 256bit keys. It also supports the Twofish encryption algorithm. it offers the RSA algorithm unlimited key bitsizes. It includes a test vector sample application with the test vectors required to demonstrate correct implementation of the encryption algorithms offered. The library uses the modern SHA2 and HAVAL hashing algorithms so that passphrases can be converted to exactly the amount of bits required for an encryption key and with better mathematical properties than older hashing algorithms such as MD5. .
Size :697K
Shareware ZRandom 1.2User Rating :(Review : 0) OS: WindowsZRandom implements high quality random number generation for Microsoft Excelusing the Merssenne Twister algorithm :.
Size :7,455K
Shareware STOIK Smart Resizer 3.0User Rating :(Review : 0) OS: WindowsThis program offers you various methods to resize digital photos including new STOIK Smart Resize algorithm which allows to enlarge digital images up to 1000% without loss of visual sharpness. The quality of resizing depends on the algorithm used for interpolation. the interpolation results in blurred image. This program offers in addition to standard methods new Smart Resize algorithm developed by STOIK Imaging. This algorithm makes intelligent zooming possible through analysis of picture content for natural textures. and application of adapted interpolation methods for specific areas. One particular important implementation of the new algorithm is enlargement of cameraphone photos and photos taken with submegapixel cameras for resolution sufficient for quality prints. The algorithm also allows for creation of smart thumbnails  small copies of originals which could be effectively restored to original resolution with simple interpolation. .
Size :97K
Demo JOpt.SDK  resource and transportation planning l 1.0.1 User Rating :(Review : 0) OS: Windows It uses specialized genetic algorithms to calculate an optimized allocation of orders and stops to mobile resources. The algorithm not only provides tours at minimum costs but also considers an arbitrary set of constraints for each tour. .
SORT BY: All / Free / Download / Title

 Copyright(c) freedownloadsApps.com