Twofish


Advertisement

VisCrypt

Features: * Secure encryption of any files and documents with 256 Bit Twofish algorithm * 3 optional log-in methods (PIN, text, picture password) * Graphical authentication: highest security warranted by the patented visual Key technology * Encrypt or

Crococrypt Portable  v.0.9b

An encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish. The keyfile is secured by a password using PKCS #5 with a SHA512/Whirlpool based HMAC and also AES and Twofish.





Advertisement

DPCRYPTO  v.1 5

DPCRYPTO is a very high secure encryption program.This program support the following algorithms: 3DES 192 Bit Key / Blowfish 448 Bit/ Cast-256 256 Bit / Mars 1248 Bit / RC6 2048 Bit / Rijndael(AES) 256 Bit / Serpent 256 Bit / and Twofish 256 Bit.

Chilkat AES & RSA Encryption Component  v.2. 2. 2000

Chilkat Crypt .NET is an advanced encryption component that offers both RSA public-key encryption with digital signatures as well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily

Chilkat Encryption .NET Component  v.2. 2. 2000

Chilkat Crypt .NET is an advanced encryption component that offers both RSA public-key encryption with digital signatures as well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily

Crococrypt  v.1.0

An encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish. The keyfile is secured by a password using PKCS #5 with a SHA512/Whirlpool based HMAC and also AES and Twofish.

Encryption Workshop

Encryption Workshop includes file and folder encryption and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only

SALVADOR

The program for cryptographic protection of the information. Includes 13 algorithms of enciphering (Blowfish, Twofish, GOST, AES (Rijndael), RC2, RC4, RC5, CAST, etc.), 21 algorithm of the elecronic-digital signature (MD, SHA, GOST, Tiger, Haval, etc.)

The Cipher

The program is designed to encrypt and decrypt files. Features: - Encryption and decryption of files using GOST, Blowfish, IDEA, Misty1, Rijndael, Twofish, Cast128, Cast256, RC2, RC5, RC6, DES, TEA on password; - Encryption and decryption of files using

SafeHouse Explorer  v.3.1.0.1

SafeHouse Explorer is an encryption tool for external and internal drives. It provides good basic security for your confidential information from thefts and other attacks. The program uses passwords and 256-bit Twofish encryption technology.

DP Multicrypt  v.2.0

DP-Multicrypt is a filecrypther with drag & drop support.

CuteZIP  v.2 1

Features Twofish 128-bit encryption for protecting yourconfidential files from prying eyes. CuteZIP is designed for seamless right-click integration, including the ability to open multiple archives at once.

Pages : 1 | 2 | Free
Newest Reviews