WinSafe is a powerful but easy to use encryption program. You can encrypt your files using strong cryptography algorithms like Blowfish, CAST, SAFER-SK128, Twofish and more.
WinSafe lets you choose from 28 different algorithms! The password used to encrypt your files is first encrypted and...
|License: Shareware||Cost: $25.00 USD||Size: 4.21 MB||Download (121): WinSafe Download|
Anything can be stolen, and computer data is not an exception. While it is very hard to make theft impossible, it is much simpler to make it useless. Encryption guarantees that even if the hacker managed to steal your data, it will not do him any good. Good encryption software is a must wherever...
Platforms: Windows, Windows 7, Windows Server
|License: Shareware||Cost: $29.95 USD||Size: 13.22 MB||Download (373): Kryptel Download|
Sending sensitive data to a remote correspondent is not a trivial task - the Internet is insecure media, and anything being sent over it can easily be intercepted or forged. If using a secure communication channel is not possible, the only option left is to secure the data themselves. There is...
|License: Shareware||Cost: $29.95 USD||Size: 11.95 MB||Download (311): Silver Key Download|
FileBarricader puts up a barricade between your files and any unauthorised person, program or entity. You encrypt your files using the latest industry standard cryptography algorithms, and only people who know the password will have access to the file. FileBarricader can also securely delete...
|License: Shareware||Cost: $17.50 USD||Size: 1.13 MB||Download (73): FileBarricader 2004 Download|
LoginCode is a user friendly password management program, which allows you to log on to your favorite web sites automatically with just few clicks. With this tool you can eventually stop thieves of private information.
Your private data is encrypted using one of the latest cryptography...
|License: Freeware||Size: 1.42 MB||Download (91): LoginCode Download|
Rar Password Recovery Easy is a tool intended to help you recover information from password-protected RAR archives. It uses the only effective method to extract passwords from archives created by modern WinRAR versions (2.90 and higher): dictionary-based attacks (password lists). Rar Password...
|License: Shareware||Cost: $50.00 USD||Size: 1.98 MB||Download (40): Rar Password Recovery Easy Download|
Python Cryptography Toolkit is a collection of both secure hash functions (such as MD5 and SHA), and various encryption algorithms. The package is structured to make adding new modules easy. I consider this section to be essentially complete, and the software interface will almost certainly not...
|License: Freeware||Size: 153.6 KB||Download (19): Python Cryptography Toolkit Download|
CrypTooLinux is an utility to learn cryptography and cryptanalysis. It is a C++/QT4 application. The primary objective is to make a clone of CrypTool on Linux. The secondary objective is to expand the application with new algorithms.
|License: Freeware||Size: 23.77 MB||Download (18): CrypTooLinux Download|
C++ Elliptic Curve Cryptography library is a C++ library for elliptic curves cryptography. Libecc is a C++ elliptic curve cryptography library that supports fixed-size keys for maximum speed. The goal of this project is to become the first free Open Source library providing the means to...
|License: Freeware||Size: 1.4 MB||Download (298): C++ Elliptic Curve Cryptography library Download|
C Algorithms Library is a collection of commonly used Computer Science algorithms. The focus is on code that is well documented and tested, portable, and reusable. The C Programming Language has a much smaller standard library compared to other more modern programming languages such as Java...
|License: Freeware||Size: 337.92 KB||Download (92): C Algorithms Library Download|
The Legion of the Bouncy Castle Java Cryptography API provides a lightweight cryptography API in Java. A provider for the JCE and JCA, a clean-room implementation of the JCE 1.2.1, generators for Version 1 and Version 3 X.509 certificates, generators for Version 2 X.509 attribute certificates,...
|License: Freeware||Size: 21.2 MB||Download (143): Legion of the Bouncy Castle Java Cryptography API Download|
[Home & Help] http://embeddedsw.net/MultiObfuscator_Cryptography_Home.html
MultiObfuscator is a professional cryptography tool
- HW seeded random number generator (CSPRNG)
- Deniable cryptography
- Up to 256Mb of secret file (binary mode)
- Up to 256Kb of secret text (text/email mode)
|License: Freeware||Size: 4.52 MB||Download (36): MultiObfuscator Cryptography & Obfuscation Download|
As3 Crypto is a cryptography library written in Actionscript 3 that provides several common algorithms. Features: - Public Key Encryption: RSA (partial. encryption only.) - Secret Key Encryption: AES, DES, 3DES, BlowFish, XTEA, RC4 - Confidentiality Modes: ECB, CBC, CFB, CFB8, OFB, CTR -...
Platforms: Windows, Mac, *nix, Flash, BSD Solaris
|License: Freeware||Download (30): As3 Crypto Framework Download|
This script implements the three standard relational join algorithms: nested loops join, hash join, and merge join, using the iterator algebra support in Python.This script also presents code that can be used for inner join, left outer join, full outer join, and semijoins. The nested loops join...
Platforms: Windows, Mac, *nix, Python, BSD Solaris
|License: Freeware||Download (27): Relational Join Algorithms Download|
Companion software for the Direct Adaptive Control Algorithms: Theory and Applications, 2e book by Howard Kaufman, Itzhak Barkana & Kenneth Sobel
|License: Freeware||Size: 686.08 KB||Download (21): Direct Adaptive Control Algorithms: Theory and Applications, 2e Companion software Download|
Non Convex Optimization Algorithms for Group SparsitySolves a dummy OFDM sparse channel estimation problemReweighted Lm,p algorithm for noiseless case min||x||_m,p s.t. y = AxReweighted Lm,p algorithm for noisy case min||x||_2,p s.t. ||y - Ax||_qSmoothed L2,0 algorithm solves a smooth version...
|License: Freeware||Size: 10 KB||Download (21): Non Convex Algorithms for Group Sparse Optimization Download|
Files used in the Webinar "Developing a Financial Market Index Tracker using MATLAB OOP and Genetic Algorithms"The zip file contains the data and files used to develop an application to track a market index using Genetic algorithm. The initial algorithm is then wrapped up in MATLAB OOP to create...
|License: Freeware||Size: 2.05 MB||Download (23): Developing a Financial Market Index Tracker using MATLAB OOP and Genetic Algorithms Download|
In cryptography, s-box is used for confusi principle, how to know the s-box is strength we use the bent function test of course for the s-box.
|License: Shareware||Cost: $0.00 USD||Size: 10 KB||Download (18): MATLAB for Cryptography Download|
Detailed information for stereo matching algorithms used in the codes can be found at http://arxiv.org/abs/0812.1340 and http://arxiv.org/ftp/arxiv/papers/0812/0812.1340.pdfRead the Readme.txt file to see how to run codes.
|License: Shareware||Cost: $0.00 USD||Size: 235.52 KB||Download (19): Region Based Stereo Matching Algorithms Download|
|License: Freeware||Size: 1.02 KB||Download (16): IdealPad Download|