Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Aes-mmo cryptographic hash in Title/Summary

febooti fileTweak Hash and CRC

febooti fileTweak Hash and CRC

It's a simple tool to compute most popular file hash checksums such as MD5, CRC32, SHA-1, SHA-2 and others. Easy to use interface allows to verify file integrity by comparing calculated checksum with a clipboard or checksum files. Integrates natively into Microsoft Windows file properties.

  • Publisher: febooti software
  • Home page: www.febooti.com
  • Last updated: January 19th, 2018
Hash Codes

Hash Codes

A cryptographic hash function is a deterministic procedure that takes an arbitrary block of data and returns a fixed-size bit string, the (cryptographic) hash value, such that an accidental or intentional change to the data will change the hash value. The data to be encoded is often called the "message", and the hash value is sometimes called the message digest or simply digest.

  • Publisher: Marek Sienczak
  • Home page: hashcodes.com
  • Last updated: September 14th, 2012
VSCryptoHash

VSCryptoHash

VSCryptoHash is a cryptographic hash calculation program. It is designed for network administrators and webmasters to calculate file control sums. It supports a variety of cryptographic hash functions, including SHA-1, SHA-256, SHA-384, SHA-512, MD5, MD4, MD2, SHA-3 (224-bit), SHA-3 (256-bit), SHA-3 (384-bit), SHA-3 (512-bit), Tiger, WHIRLPOOL, RIPEMD-128, RIPEMD-160, RIPEMD-256.

  • Publisher: Vincent Sheldon
  • Home page: www.lokibit.com
  • Last updated: June 8th, 2015

Aes-mmo cryptographic hash in Description

SumChecker

SumChecker

The MD5 Message-Digest Algorithm is a widely used cryptographic hash function with a 128-bit (16-byte) hash value. In cryptography, SHA-1 is a cryptographic hash function designed by the National Security Agency and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm.

  • Publisher: Strizhevsky Artem
  • Home page: code.google.com
  • Last updated: October 31st, 2011
MDFiveCheck

MDFiveCheck

The MD5 Message-Digest Algorithm is a widely used cryptographic hash function with a 128 -bit (16-byte) hash value. MDFiveCheck is a simple .NET ClickOnce MD5 checker application that can either validate or create an MD5 Checksum for any given file.

  • Publisher: Andy Gumbrecht
  • Last updated: January 28th, 2012
MarshallSoft Advanced Encryption Standard (AES) Library

MarshallSoft Advanced Encryption Standard (AES) Library

AES Encryption library provides a simple interface to encrypt/decrypt files, strings or data from Visual Foxpro programs using 256-bit AES (Rijndael) encryption keys. Supports CBC and ECB mode, initialization vectors, and buffer padding. Win32/Win64

  • Publisher: MarshallSoft Computing
  • Home page: www.marshallsoft.com
  • Last updated: January 22nd, 2015
MarshallSoft Visual dBase AES Library

MarshallSoft Visual dBase AES Library

AES Encryption library provides a simple interface to encrypt/decrypt files, strings or data from Visual dBase programs using 256-bit AES (Rijndael) encryption keys. Supports CBC and ECB mode, initialization vectors, and buffer padding. Win32/Win64

  • Publisher: MarshallSoft Computing
  • Last updated: January 22nd, 2015
CryptoSys API

CryptoSys API

CryptoSys API is a toolkit of fast, efficient symmetrical cryptographic functions in Visual Basic, VBA, VB.NET/VB2005/8/x, C/C++, C#, and ASP. You can incorporate it in your own apps or call it from VBA applications like Access, Excel and Word. It provides four of the major block cipher algorithms, a stream cipher algorithm, key wrap etc.

  • Publisher: D.I. Management Services Pty Limited
  • Home page: www.cryptosys.net
  • Last updated: March 22nd, 2013

Additional Aes-mmo cryptographic hash selection

WinHasher

WinHasher

WinHasher is a free, Open Source cryptographic hash or digest generator written in C# using Microsoft's .NET 2.0 Framework. It can be used to verify file download integrity, compare two or more files for modifications, and to some degree generate strong, unique passwords. (For password generation, we recommend our derivative project, Cryptnos for Windows and Android.)

  • Publisher: Jeffrey T. Darlington
  • Home page: code.google.com
  • Last updated: July 22nd, 2013
MarshallSoft Delphi AES Library

MarshallSoft Delphi AES Library

AES Encryption library provides a simple interface to encrypt/decrypt files, strings or data from Delphi programs using 256-bit AES (Rijndael) encryption keys. Supports CBC and ECB mode, initialization vectors, and buffer padding. Win32/Win64.

Hash Tool

Hash Tool

Hash Tool allows you to find the hash value for a file, quickly and easily. It supports batch mode processing, so that you can calculate the hash values of many files at once. In addition, it supports all popular hashing algorithms, including MD5, SHA1, and CRC32. Once calculated, hash values can be exported to a TXT or a CSV file.

VT Hash Check

VT Hash Check

VT Hash Check adds a Windows Explorer context menu item to compute the MD5 or SHA1 hash checksum of any file and to then send them online for checking against their Virus database. Results may optionally be saved in plain text, CSV, or JSON. VT Hash Check comes with TrID built-in for identifying unknown files.

File Hash Checker

File Hash Checker

File Hash Checker is a tool which allows you to compute the MD5 and SHA1 hash of any file. It also allows you to check the computed hash against a database of known MD5 and SHA1. Currently this database only contains the hashes from ISO of Microsoft products like Windows 7, Windows Vista, Office, in English and French.

WebSigner Extension

WebSigner Extension

This add-on allows you to create a digital signature on the web-pages of an online banking system using cryptographic protection of information. Cryptography can be used to support random number generation and hash generation. It secures the communication between your PC and a bank server.

  • Publisher: bifit-service
  • Last updated: July 24th, 2017
MD5 Hash Generator

MD5 Hash Generator

The MD5 Hash generator allow you to generate 128-bit MD5 hashes for your files, allowing you to check for corruption during downloads, or to generate the MD5's for distributing with your software. The MD5 Hash generator has:Drag and Drop functionality, Right-clicking on any file shows "Generate MD5 hash" option, etc.

  • Publisher: drnaylor.co.uk
  • Last updated: October 11th, 2009
Advanced Hash Calculator

Advanced Hash Calculator

Advanced Hash Calculator is an app that calculates hash strings for multiple files at once. Just drag and drop files at the main screen of this software and hash values for the files will be calculated and displayed on the fly. Hashing algorithms supported are CRC32, GOSThash, MD2, MD4,.MD5, SHA-1, SHA2-256, SHA2-384, SHA2-512.

  • Publisher: Filesland
  • Home page: www.filesland.com
  • Last updated: September 22nd, 2020
The Cryptographic Tool

The Cryptographic Tool

The Cryptographic Tool is an application that provides, for everyone, a cryptographic implementation of the RSA, AES and RC4 algorithms. Steganography is also supported, providing a secure transfer solution. The goal is to make all people access to this nice cryptographic world.

  • Publisher: GUINET Adrien
  • Last updated: February 1st, 2010
DP Hash

DP Hash

Dp Hash is the succession from DPASHA. This program supported at this time the following hash: adler32, crc16, crc24, crc32, crc64, EDonkey, MD2, MD4, MD5, SHA, SHA1, SHA256, SHA384, SHA512, Sapphire, Panama, Tiger, RipeMD128, RipeMD160, RipeMD256, RipeMD320, Haval128, Haval160 etc.

  • Publisher: Dirk Paehl
  • Home page: www.paehl.de
  • Last updated: August 27th, 2019