MAXA Key Exchanger 1.0
MAXA Key Exchanger uses a cryptographic protocol (Diffie-Hellman key exchange) that allows two parties that do not know each other to jointly establish a shared, secret key, over an insecure communications channel (like email or instant messaging). ...
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- FoneLab Data Retriever
- Informachine File Manager
- Migrate Access Database to...
- Disk Media Recovery Software
- Pocket PC Device Forensic Tool
- HTMeLd
- ChequeSystem Cheque...
- Flash Card Recovery Software
- Aiseesoft FoneLab iPhone...
- SSuite Office Premium HD+
- AnyMP4 Blu-ray Creator
- FAT Volume Data Recovery
- Restore Deleted Mac Files
- UltraFileSearch Std Portable
- MSMassEmailSenderPro
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Hellman Download
-
1Freeware
-
2Puffer 4.0
Use Puffer to securely exchange email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute ...$34.95 -
3HIME: Huge Integer Math and
RSA public key, AES, RC4 secret key encryption, MD5, SHA-512 hash function, random number generation (Blum-Blum-Shub, RSA), Diffie-Hellman, compression, securely erase files. Every programming language that can access a dll can use HIME: C, C++, C#, ...$59.00 -
4Radmin Remote Control 3.5.1
Radmin 3 demonstrates a remarkable increase of security due to its integration with professional developments such as Windows Security, 256 bit AES data encryption for all data transferred, NTLM/Kerberos, modified Diffie-Hellman 2048 bit algorithm ...$49.00
Buy -
5Radmin Communication Server 3.0
For user authentication and session key setups, a modified Diffie-Hellman exchange with a 2048-bit key size is used. All data are encrypted by AES with a 256-bit key size.$175.00 -
6gateProtect Command Center 3.1
509 certificates -3DES, AES (128, 192, 256) -Blowfish (128, 192, 256) -DPD (Dead Peer Detection) -Compression -PFS (Perfect Forward Secrecy) -MD5, SHA1, SHA2 (256, 384, 512) -Diffi Hellman group (1, 2, 5, 14, 15, 16,17,18) -SSL -Site-to-site -Client-to-Site ...$2,995.00 -
7Chilkat MIME 3.0
Create an manipulate MIME and S/MIME messages. -Navigate the MIME message tree structure via the NumParts property and GetPart(index) method. - Retrieve header field names and values. - Add header fields to a MIME message. -Add a detached (clear-text) ... -
8ZeitControl BasicCard Development
With the BasicCard Development Kit, any programmer proficient in BASIC will be programming a smart card in one day, even without prior smart card experience. BasicCard® is the first smart card programmable in BASIC. It is easy to use, open to ...$77.57 -
9Cryptography | Comp. Sc. Engg. 1
Some of topics Covered in this application are: 1) Basics of Cryptography 2) Conventional cryptography 3) Key management and conventional encryption 4) Keys 5) Pretty Good Privacy 6) Digital signatures 7) Digital certificates 8) The OSI Security Architecture 9) Network Security 10) Types of attacks 11) Denial of service attack 12) Smurf Attack 13) Distributed Denial of Service Attacks 14) Security Mechanism 15) A Model for Network Security 16) Symmetric Ciphers 17) Classical SubstitutionTechniques 18) Classical Transposition Techniques 19) Rotor Machines 20) Steganography 21) Block Cipher Principles 22) The Data Encryption Standard 23) Differential Cryptanalysis Attack 24) Cipher and Reverse Cipher 25) Security of DES 26) The Strength of DES 27) Differential and Linear Cryptanalysis 28) Block Cipher Design Principles 29) Finite Fields 30) The Euclidean Algorithm 31) Finite Fields of The Form GF(p) 32) Polynomial Arithmetic 33) Finite Fields Of the Form GF(2n) 34) The AES Cipher 35) Substitute Bytes Transformation 36) Evaluation Criteria For AES 37) ShiftRows Transformation 38) AddRoundKey Transformation 39) AES Key Expansion Algorithm 40) Equivalent Inverse Cipher 41) Multiple Encryption and Triple DES 42) Triple DES with Two Keys 43) Block Cipher Modes of Operation 44) Cipher Feedback Mode 45) Output Feedback Mode 46) Counter Mode 47) Stream Ciphers 48) The RC4 Algorithm 49) Random Number Generation 50) Pseudorandom Number Generators 51) Linear Congruential Generators 52) Cryptographically Generated Random Numbers 53) Blum BlumShub Generator 54) True Random Number Generators 55) Key Hierarchy 56) Key Distribution Centre 57) Transparent Key Control Scheme 58) Controlling Key Usage 59) Confidentiality Using Symmetric Encryption 60) Link versus End-to-End Encryption 61) Key Distribution 62) Traffic Confidentiality 63) Prime Numbers 64) Fermat\\\'s and Euler\\\'s Theorems 65) Testing for Primality 66) The Chinese Remainder Theorem 67) Discrete Logarithms 68) Principles of Public-Key Cryptosystems 69) RSA Algorithm 70) Optimal Asymmetric Encryption Padding 71) Key Management 72) Distribution of Secret Keys Using Public-Key Cryptography 73) Diffie-Hellman Key Exchange 74) Example ...$1.00 -
10Network Management & Security 1
Diffie-Hellman key exchange 72. Man-in-the-Middle Attack on Deffie-Hellman protocol 73. Elliptic curve cryptography 74. Cryptography with Elliptic Curves 75. Digital Signature 76. Digital Signature Standard 77. Kerberos 78. Kerberos Version 4 Authentication ...$1.00