Results For "hash algorithm"

   
Order by Related - New Release - Rate

 

Results in Title For hash algorithm

Algorithm

 Do you want to create your own program? Algorithm2 is a free tool for game and software development at home! With its help anybody can create a program without a knowledge of any programming language. ..

Image comparison algorithm

 We are proud to present you our unique image comparison algorithm implemented as standalone dll file. It has only one exported function with two bitmap pointers in and similarity percentage out. Can work with many programming languages including Delphi, Visual C++, C#, VB and VB.NET. We can also provide you with the modified DLL. It can precalculate image hash (768 bytes) and you can use these hashes for comparison then. You can check our comparison algorithm with help of our Image Comparer tool. Use Google to quickly locate it. Command line version is also available. Custom versions are available too. ..

Color Hash

 Simple logic game. You do steps serially with the computer. For the least number of steps you should grasp more blocks. After you will choose color, the blocks of this color will adjoin your territory. The field has the sizes 54x45 of blocks, total 2430 blocks, therefore for a victory you should grasp more than 1215 blocks. ..

 

MD5 Hash

 Calculate the hashes of multiple files - MD5, CRC32, SHA-1, SHA-256, SHA-384, SHA-512. You can copy MD5 hashes to the clipboard or save to a text file from an easy to use interface. ..

SentiSight algorithm demo (for Windows)

 Object recognition technology for robotics and computer vision. Supports webcams, surveillance cameras, still image and video files. Tolerant to object scale, rotation, pose etc. Real-time video stream processing. The algorithm implements advanced visual-based object learning and recognition. Suitable for real-time applications like security systems, parts recognition in production lines, road signs recognition, image search engines etc. ..

Advanced Hash Calculator

 Calculate hash with this handy software. Just drag and drop files in this calculator and hash string for the files will be immideately displayed. Supported cryptographic hash calculation algorithms include CRC32, GOST hash, MD2, MD4,MD5, SHA-1, SHA2 ..

VeriFinger Algorithm Demo for MS Windows

 Demo application enrolls and identifies fingerprints from supported fingerprint scanners or image file, and can calculate ROC with custom fingerprint databases. Fingerprint recognition technology and software for PC and Mac. ..

VeriLook algorithm demo for MS Windows

 The SDK is based on the VeriLook PC-based face identification technology. It can be used with most cameras, webcams and databases on Linux or Windows. Simultaneous multiple faces' detection, processing and identification up to 80,000 faces/second ..

febooti fileTweak Hash & CRC 2.0

 Simple and easy to use file hash value calculator embedded into Windows properties pages and compatible with febooti fileTweak module integration. Supports CRC32, MD5, SHA-1 and other most common hash algorithms. ..

 

Results in Keywords For hash algorithm

 

File Encryptor

 This is an excellent file encryption tool in that it is very easy and quick to use. 'File Encryptor' is freeware...

FingerCell EDK Trial

 30 day embedded SDK trial, allows developers to explore the SDK's possibilities and to try it in real environments and real applications. Includes algorithm library, C/C++ programming samples, scanner drivers for Linux. Integration into ARM-based devices with ARM Linux or MS Windows Mobile. Constant internet connection required during evaluation. Commercial EDK types available: the kit with ready-to-use hardware device for fast development, the kit with algorithm library for ARM developers, the kit with algorithm full source code for large-scale development using ARM-based or other embedded hardware. For more information please review our web site or contact us...

Credit Card Check Tool

 Credit Card Checker Tool instantly check credit card number for validity. It verifies MasterCard, Visa, Carte Blanche, Diners Club, EnRoute, American Express (AMEX), Discover, JCB and other credit card numbers. Credit Card Check Tool utilizes LUHN10 algorithm (except EnRoute) and first card digits verification algorithm. * Verifies MasterCard, Visa, American Express, Discover, Diners Club and many other card type numbers * Uses LUHN10 checksum algorithm * Performs first card digits identification * Automatically determines type of the card..

SentiSight algorithm demo (for Windows)

 Object recognition technology for robotics and computer vision. Supports webcams, surveillance cameras, still image and video files. Tolerant to object scale, rotation, pose etc. Real-time video stream processing. The algorithm implements advanced visual-based object learning and recognition. Suitable for real-time applications like security systems, parts recognition in production lines, road signs recognition, image search engines etc...

CypherZIP

 If you need a professional ciphered ZIP files creator, CypherZIP is your only choice. CypherZIP joins the reliability of the ZIP compression algorithm with Rijndael (the current AES) and DS2 algorithms. It is the unique to include the exclusive Paranoia Keyboard..

Image comparison algorithm

 We are proud to present you our unique image comparison algorithm implemented as standalone dll file. It has only one exported function with two bitmap pointers in and similarity percentage out. Can work with many programming languages including Delphi, Visual C++, C#, VB and VB.NET. We can also provide you with the modified DLL. It can precalculate image hash (768 bytes) and you can use these hashes for comparison then. You can check our comparison algorithm with help of our Image Comparer tool. Use Google to quickly locate it. Command line version is also available. Custom versions are available too...

Resize Pilot

 Resize Pilot helps you resize photos quickly and easily. This photo resizing program has a unique algorithm for image enlarging. Sharpness of the image may slightly improve as a secondary effect of applying the algorithm...

PrimaSoft Encryption

 Service Process: You can run scheduled auto-recurring encryption and decryption sessions as a service process. Encryption Scheduler: PrimaSoft Encryption utility comes with flexible scheduler. You can schedule auto recurring encryption sessions for any future date and time. Encryption algorithms: AES (US Advanced Encryption Standard) secret-key encryption algorithm known as Rijndael. Certified by National Institute of Standards and Technologies (NIST). AES is the new official US government standard for encryption of data. Twofish encryption algorithm, a runner-up candidate for AES. RSA encryption is a public-key encryption algorithm. Encryption compression and decompression: You can use the most popular ZIP archive file format within the Strong File Encryption / Decryption utility. You can define automatic compression and decompression of the encrypted or decrypted files. Encryption Log: Our software maintains a detailed Activity Log so you can easily find out which encryption sessions were successful, which failed and why. Our program can send email notification with information about successful or failed file encryptions and decryptions...

Cool File Encryption

 Reliable and convenient encryption software for files, using AES algorithm. Features 1.Easy to use interface like MAC's GUI. 2.Can encrypt files of any type and any size. 3.Can encrypt files with strong AES algorithm. 4.Can encrypt more than one file at a time,can decrypt more than one file a time. 5.Adopt the international standard cryptographic algorithm--AES. 6.Support the 128,192,256-digit code in AES mode...

DiamondCS MD5

 This is our implementation of the famous MD5 algorithm, and presents an easy and highly secure way of verifying the integrity of files. Single-line text, multi-line text and file contents are all supported inputs. The resulting MD5 hash is displayed in a textbox for easy clipboard copying. Software is often accompanied by an MD5 'hash' (or 'checksum'). This serves as a unique identifier for the contents of the file - if the file contents change then so does the MD5 hash, making it easy to verify the integrity of files. A brief description of MD5: The algorithm takes as input a message of arbitrary length and produces as output a 128 bit (16 byte) "fingerprint" of the input (also known as a "message digest", "checksum" or "hash"). It is conjectured that it is computationally infeasible to produce two messages having the same message digest, or to produce any message having a given prespecified target message digest. The MD5 algorithm was designed by Ron Rivest...

 

Results in Description For hash algorithm

 

HashTab

 A windows shell extension which installs a new tab with file hash information. Includes MD5, SHA1 and CRC032. Also allows for easy hash comparison. Great for verifying downloads without requiring any external tools...

Image comparison algorithm

 We are proud to present you our unique image comparison algorithm implemented as standalone dll file. It has only one exported function with two bitmap pointers in and similarity percentage out. Can work with many programming languages including Delphi, Visual C++, C#, VB and VB.NET. We can also provide you with the modified DLL. It can precalculate image hash (768 bytes) and you can use these hashes for comparison then. You can check our comparison algorithm with help of our Image Comparer tool. Use Google to quickly locate it. Command line version is also available. Custom versions are available too...

DigiSign COM component 1.0 by Donia Software- Software Download

  A COM component that provides developers with a way to create data checksums, digital signatures, certificates. DigiSign is based on the MD5 Hash algorithm and can be used for password encryption, data checksums, and to protect files against hacking, virii or data corruption during file ..

Iside

 Iside is a message digest, hash code computing tool. It can be used for file integrity checking. It also compares files and folders by computing their hash code (MD5,SHA1,CRC32,...)...

HashCalc

 Fast calculator to compute hash, checksum, HMAC values for file, text and hex string. Supports MD2,MD4,MD5, SHA1,SHA2, RIPEMD160,PANAMA,TIGER, CRC32,ADLER32 algorithms and the hash used in eMule/eDonkey(eDonkey2000,ed2k). Good to check/compare files...

File Checksum Tool

 File Checksum Tool is a free utility that calculates MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512 hash from a file. The software allows you to verify the Hash or create new checksum for your important data...

MD5 hasher

 Computes MD5 hash for any single file, can compare it with given. Integrates in Send To and shell on demand. Un-integrates on demand. Drag-and-drop supported. Automatically looks for corresponding md5 file with hash to compare, and vise-versa...

Encrypt Easy 3.0 by Baltsoft- Software Download

  Encrypt Easy is a highly secure file encryption program. Current version of Encrypt Easy uses the 67 encryption methods: Cipher: 3Way, Blowfish, Gost, IDEA, Q128, SAFER-K40, SAFER-SK40, SAFER-K64, SAFER-SK64, SAFER-K128, SAFER-SK128, SCOP, Shark, Square, TEA, TEA extended, Twofish, Cast 128, Cast 256, DES Single 8byte, DES Double 8byte, DES Double 16byte, DES Triple 8byte, DES Triple 16byte, DES Triple 24byte, DESX, Diamond II, Diamond II Lite, FROG, Mars, Misty 1, NewDES, RC2, RC4, RC5, RC6, Rijndael, Sapphire II, Skipjack. Hash: Message Digest 4, Message Digest 5, Secure Hash Algorithm, Secure Hash Algorithm 1, Ripe Message Digest 128, Ripe Message Digest 160, Ripe Message Digest 256, Ripe Message Digest 320, Haval-128, Haval-160, Haval-192, Haval-224, Haval-256, Sapphire II-128, Sapphire II-160, Sapphire II-192, Sapphire II-224, Sapphire II-256, Sapphire II-288, Sapphire II-320, Snefru-256, Square, Tiger, XOR-16, XOR-32, CRC-16 CCITT, CRC-16 Standard, CRC-32. Each file is encrypted with two encryption methods, Cipher+Hash, and with its own password and can only be decrypted using the same password. This version also has self extracting. Now you can send encrypted files through Internet and decrypt them without using Encrypt Easy program. It is very fast, comfortable and safe! New version of Encrypt Easy gives user even more functions - better interface, encrypted file compression, command line tool, Windows XP support, password validation box, detailed description of all function, interactive demonstration for users. ..

CommuniCrypt File Encryption Tools

 File encryption/decryption tools with strongest AES algorithms. Can generate the hash of the source file as password for symmetric encryption(64 digits password). Encryption strength AES Rijndael: 256 bit / Hash: SHA-256..

Hpmbcalc Hex Calculator

 This is a programmable multiple-precision hex calculator with many utilities. With Hpmbcalc, you can easily perform a lot of big number math operations. Key Features: 1. Standard hex calculator panel: basic big number math operations; Hex/Dec/Oct/Bin conversion; byte/operand swap; square root, Jacobi symbol calculation. 2. Scripting host and automation support: VBScript and JScript support; multiple-precision operation methods. 3. Hash/checksum/CRC calculator: MD2, MD4, MD5, SHA hash algorithm; 16 and 32-bit CRC value; message and file support. 4. Hex formatter: ASCII text, c-source code, memory dump, big number to hex number. 5. Pseudo-random data/prime generator: generate a pseudo-random sequence of bits or a probabilistic prime. 6. Randomicity/primality test tool. Perform primality test and some statistical tests on a data...

 

Results in Tags For hash algorithm

 

MSCCrypto for Linux

 MSCCrypto includes collection of the best encryption and hashing algorithms: RSA, AES, Blowfish, Twofish, MD5, SHA1 and 32-bit CRC checksum. Includes PGP/OpenPGP compatible component..

MSCCrypto for Windows

 MSCCrypto includes collection of the best encryption and hashing algorithms: RSA, AES, Blowfish, Twofish, MD5, SHA1 and 32-bit CRC checksum. Includes PGP/OpenPGP compatible component..

Advanced Hash Calculator

 Calculate hash with this handy software. Just drag and drop files in this calculator and hash string for the files will be immideately displayed. Supported cryptographic hash calculation algorithms include CRC32, GOST hash, MD2, MD4,MD5, SHA-1, SHA2..

Ultra Crypto Component

 Easy and advanced encryption, decryption and hash ActiveX component for ASP or ASP.Net Support encryption and decryption of file, string, memory buffer Support calculation of hash on string, file or memory buffer Support digital signature..

SHA1 Password 1.0.292

 SHA-1 Password is a tool for security professionals, which allows recovering a password if you know its SHA-1 hash. The fast recovery engine can recover up to 32,000 passwords simultaneously...

HashX

 HashX is a powerful yet very easy to use application designed for computes hash value(checksum) for any single file, it allows you to verify that downloaded files are not corrupted or otherwise unusable...

HashCalc

 Fast calculator to compute hash, checksum, HMAC values for file, text and hex string. Supports MD2,MD4,MD5, SHA1,SHA2, RIPEMD160,PANAMA,TIGER, CRC32,ADLER32 algorithms and the hash used in eMule/eDonkey(eDonkey2000,ed2k). Good to check/compare files...

StorageSafe

 StorageSafe provides high performance security for flash and hard disk type storage on USB and IEEE 1394 buses. It includes transparent device encryption, guards against 180,000+ common passwords, and secure file and device erase. From the ground up, StorageSafe was designed to meet end-user demands such as 1) genuine security; 2) solid reliability; 3) everyday ease-of-use, and; 4) little or no reduction in productivity. After the device password is entered, the 256-bit Advanced Encryption Standard, the 512-bit Secure Hash Algorithm, and others from our time tested media security library go to work, silently. There is no noticeable impact on bandwidth, even with older generation CPUs. An extensible system instantly checks for and limits the use of more than 180,000 common (easy to guess) passwords. Secure file and device erase that exceeds DoD Standards can remove sensitive files from unwanted locations. All commands except (Install/Uninstall) work under Windows Guest/Limited User accounts. As another industry first, the deprotect routines are fully interrupt tolerant. This is especially important given that the product is targeted at devices that can be detached at any time. StorageSafe is licensed by CPU, not by device. Therefore, it cost effectively provides a unified security interface to your entire inventory of USB/IEEE 1394 storage devices. The single unit, direct download price is $24.99; multi-unit pricing and site licenses are available. To ensure your complete satisfaction, we include a 30-day Money Back Guarantee...

QuickHash Library

 A fast, highly optimized implementation of hash and checksum algorithms: MD2, MD4, MD5, SHA-1, SHA-2(256,384,512), RIPEMD(128,160,256,320), PANAMA, TIGER, CRC-32, CRC-16, CRC-CCITT, ADLER32. The library allows to calculate hashes (message digests), checksums and HMACs for files, memory blocks, strings, blobs, streaming data. It is quick, flexible, easy to use. It supports 3 interfaces: QuickHash API (the API can be used as is, or it can be used to create wrappers for languages that can use DLL or LIB), C++ Interface (C++ wrapper classes to QuickHash API), and QuickHash Type Library (includes all declarations for accessing the functionality from programming languages that can reference a .TLB, such as VB 5.0, VB 6.0, VBA, etc). It allows static/dynamic linking. It has no external dependencies such as MFC DLLs, COM/DCOM or other component. The help file has C, C++ and Visual Basic examples showing how to add hash, checksum and HMAC calculations to Windows applications quickly and easily...

SentiSight algorithm demo (for Windows)

 Object recognition technology for robotics and computer vision. Supports webcams, surveillance cameras, still image and video files. Tolerant to object scale, rotation, pose etc. Real-time video stream processing. The algorithm implements advanced visual-based object learning and recognition. Suitable for real-time applications like security systems, parts recognition in production lines, road signs recognition, image search engines etc...

Related search : its keykey sizeblock algorithmsymmetric blockbits hashalgorithm 128,symmetric block algorithmcrc checksum algorithm160 bits hash,hash calculator advancedadvanced hash calculatorencryption andalgorithm likesupport encryptionmd5 shahash algorithmultra
Order by Related - New Release - Rate

  hash keys -   hash file -   hash downloader 1.0.0 -   hash values -   hash calculator -

 

 

Premium Softwares
 
Advertisement