Sha 512
Quick Checksum Verifier checks file integrity by secure time proven algorithms like MD5 and SHA-1.
You can easily create checksums of files and verify their integrity in the future. The operation is very easy, just two steps. Load the file and paste the predefined checksum.
This software...
Platforms: Windows
License: Freeware | Size: 1.7 MB | Download (408): Quick Checksum Verifier Download |
CheckSummer is a graphical software designed to calculate cryptographic checksums of arbitrary files. It supports MD5, SHA-1 and SHA-256 digest algorithms.
CheckSummer's interface is easy to use because it does not have useless graphics or unnecessary buttons.
Platforms: Windows
License: Freeware | Download (45): CheckSummer Download |
MD5 Checksum Tool is an application designed to allows users to generate the file checksum (MD5/SHA Hash) of any file or string. It can also be useful to check if an executable file is legit, in other words, if it is the official release from the offical author. Hashes supported are: MD5, SHA1,...
Platforms: Windows
License: Freeware | Size: 532 KB | Download (431): MD5 Checksum Tool Download |
Dp Hash 1.0 is the succession from my DPASHA. This program supported at this time the following hash: adler32, crc16, crc24, crc32, crc64, EDonkey, MD2, MD4, MD5, SHA, SHA1, SHA256, SHA384, SHA512, Sapphire, Panama, Tiger, RipeMD128, RipeMD160, RipeMD256, RipeMD320, Haval128, Haval160, Haval192,...
Platforms: Windows, Other
License: Freeware | Size: 436 KB | Download (430): DP HASH Download |
Pure managed C# implementation of well-known cryptographic hash functions such as SHA-family (SHA0, SHA1, SHA2), MD-family (MD2, MD4, MD5), RIPEMD, Tiger, Haval, Snefru and others.
Platforms: Windows, Mac, Linux
License: Freeware | Size: 134.71 KB | Download (58): ACryptoHash.Net Download |
A smart card-based public key cryptography system based on elliptic curves, using AES for session key generation and SHA for hashing. This project will include the smart card software, terminal software, and a public key server.
Platforms: Windows, Mac, Linux
License: Freeware | Size: 686.15 KB | Download (59): BasicCard Elliptic Curve PKS Download |
Common Data Security Architecture Objective-C Wrapper Framework - Digest: MD5/SHA-1 - Encryption/Decryption: Symmetric encryption - Utils: Base64 encoding/decoding
Platforms: Mac
License: Freeware | Size: 596.25 KB | Download (59): CDSA/CSSM Ojective-c encryption Wrapper Download |
Computes the MD5, SHA-1, SHA-256, Tiger, or Whirlpool message digest for any number of files while optionally recursively digging through the directory structure. Can also match input files against lists of known hashes in a variety of formats.
Platforms: Windows, Mac, BSD, Solaris, Linux
License: Freeware | Size: 1.35 MB | Download (54): md5deep and hashdeep Download |
Shasummer is a SHA hashsum utility in Java. It can calculate SHA1, SHA256 and SHA512 hashes of a file or of a directory (and its subdirectories) and verify the hashes later. Shasummer has a graphical and a command-line interface.
Platforms: Windows, Mac, Linux
License: Freeware | Size: 320.1 KB | Download (58): shasummer Download |
A set of very small categories for NSString, NSMutableString, NSArray, and NSDictionary that add a few sorely lacking features (isEmpty and containsKey: methods, for instance). These functions can be found in MPFunctions.h. . NSString *MPHexStringFromBytes(void *bytes, NSUInteger len) ....
Platforms: Mac
License: Freeware | Size: 10.24 KB | Download (44): MPTidbits Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 18.29 MB | Download (39): KeyMingler Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 12.35 MB | Download (34): gurbas Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 5.32 MB | Download (38): nulis Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 5.16 MB | Download (38): Vakar Download |
The pycryptopp package contains Python wrappers for the Crypto++ library. RSA-PSS-SHA256 signatures, ECDSA(1363)/EMSA1(SHA-256) signatures, SHA-256 hashes, and AES-CTR encryption
Platforms: *nix
License: Freeware | Size: 1.06 MB | Download (39): pycryptopp Download |
Cryptocx v3 is the new standard in encryption components.
Cryptocx v3 develops and expands version 2 to make it even easier to use and incorporate into your own existing systems or ASP sites. Full compatibility with PGP means that Cryptocx can encrypt data which can be emailed or stored and...
Platforms: Windows
License: Freeware | Size: 3 KB | Download (233): Cryptocx v3 Download |
NeoNapster is a free file sharing program based on the Gnutella protocol. Similar to Napster and Morpheus, NeoNapster gives users the ability to search for, download, and share music, videos, software and more with millions of others.
NeoNapster supports the most powerful Gnutella features,...
Platforms: Windows
License: Freeware | Size: 2.31 MB | Download (726): Neo Napster Download |
Advanced hexadecimal editor. Few important programs features: 6 color schemes to interpret bytes visually. Every of them tryies to fit some functionality (for example text analyzing) and user preferences Unlimited undo Access to logical disks under Windows NT/2000/XP Disassembler Import and...
Platforms: Windows
License: Freeware | Size: 485 KB | Download (755): Hexplorer Download |
This tool can generate a TSIG key value (base64) for you very easily. The key value complies with RFC2845.
Secret Key Transaction Authentication for DNS (TSIG) is a secure method of authenticating clients making dynamic DNS update requests. The client application and the DNS server share a...
Platforms: Windows
License: Freeware | Size: 143 KB | Download (225): TSIG Key Generator Download |
File encryption/decryption tools with strongest AES algorithm. Can generate the hash of the source file as password for symmetric encryption(64 digits password). Encryption strength AES Rijndael: 256 bit / Hash: SHA-256
Platforms: Windows
License: Freeware | Size: 1.39 MB | Download (586): CommuniCrypt File Encryption Tools Download |