sha-1 algorithm downloads

Hash Codes x64

1.62.780.7200 download

... supports: Adler32, CRC32, CRC64, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320 or Whirlpool algorithm. Features: Hash data from keyboard, file ... CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, ...

Toms Hash Explorer

1.2 download

... verify file integrity. Supports the most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including SHA256, SHA384, and SHA512. Key Features include: ... + Calculate Hash Values using industry standard hashing algorithms + Calculate File Entropy using Shannon's Entropy algorithm ...

Hexplorer

2.6 download

... find repeating patterns in data, includes Fourier transform algorithm * Pixel viewer to show binaries as bitmaps ... and vice versa * Very fast Boyer-Moore find algorithm * Highlights selected byte strings in data to ...

Md5deep

4.4 download

... is a set of programs to compute MD5, SHA-1, SHA-256, Tiger, or Whirlpool message digests on an arbitrary ... file matches a known file in one hash algorithm but not in others. The results are displayed ...

VeryUtils PDF Digital Signature Tool

2.7 download

... OCSP. * Setting certification level. * Setting hash algorithm. * PDF encryption and setting rights. * SHA 256/512 support. * Time Stamping. Signing a PDF ...

MarshallSoft Visual Basic AES Library

6.0 download

... National Institute of Standards and Technology (NIST).The AES algorithm is commonly used by many financial entities such ... - Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data ...

MarshallSoft C/C++ AES Library

6.0 download

... - Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. - Allows ...

MarshallSoft FoxPro AES Library

6.0 download

... National Institute of Standards and Technology (NIST).The AES algorithm is commonly used by many financial entities such ... - Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data ...

Porta+ Private Notes

4.5 download

... keys are generated from your password using the SHA algorithm. * Text formatting features - text formatting features ...

MarshallSoft Delphi AES Library

6.0 download

... National Institute of Standards and Technology (NIST).The AES algorithm is commonly used by many financial entities such ... - Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data ...

Python Encryption Library for Linux

9.5.0.98 download

... binary data. Python Encryption Library implements symmetric encryption algorithms: Rijndael, Blowfish, Twofish. Also provides public-key encryption and ... RC2, ARC4, DES, 3DES, PBES1, PBES2. * Hash Algorithms: SHA-1, SHA256, SHA384, SHA512, MD2, MD4, MD5, HAVAL. ...

Python Encryption Library x64

9.5.0.98 download

... binary data. Python Encryption Library implements symmetric encryption algorithms: Rijndael, Blowfish, Twofish. Also provides public-key encryption and ... RC2, ARC4, DES, 3DES, PBES1, PBES2. * Hash Algorithms: SHA-1, SHA256, SHA384, SHA512, MD2, MD4, MD5, HAVAL. ...

MarshallSoft XBase++ AES Library

5.0 download

... National Institute of Standards and Technology (NIST).The AES algorithm is commonly used by many financial entities such ... - Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data ...

MarshallSoft dBase AES Library

5.0 download

... National Institute of Standards and Technology (NIST).The AES algorithm is commonly used by many financial entities such ... - Supports ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data ...

File Checksum Utility

2.1.0.0 download

... software allows to generate MD (Message Digest) and SHA (Secure Hash Algorithm) hashes from a single file or files in ... value from the content of file by special algorithm. Duplicated files are highlighted, but also bigger and ...

File Checksum Calculator

1.2 download

... that generates and verifies cryptographic hashes in MD5, SHA-1 and SHA-256. Cryptographic hash functions are commonly used to guard ... common cryptographic hash functions are the Secure Hash Algorithm (SHA) and Message Digest Algorithm-5 (MD5). Checksum utilities ...

TekOTP

1.4.2 download

... for updates. Generates OTPs with MD4, MD5 and SHA-1. Simple, easy to use GUI. Enter seed, pass phrase, set count and algorithm and click 'Calculate' button to generate an OTP.

TekCERT

2.7.7 download

... Generates 1024, 2048, 3072 and 4096 bits certificates. Sha-1withRSAEncryption, sha256withRSAEncryption, sha384withRSAEncryption and sha512withRSAEncryption key algorithms supported. Freeware version supports only sha-1withRSAEncryption. Supports Automatic Certificate Management Environment, ACME (RFC 8555), ...

Python Encryption Library for Mac OS X

9.5.0.98 download

... binary data. Python Encryption Library implements symmetric encryption algorithms: Rijndael, Blowfish, Twofish. Also provides public-key encryption and ... RC2, ARC4, DES, 3DES, PBES1, PBES2. * Hash Algorithms: SHA-1, SHA256, SHA384, SHA512, MD2, MD4, MD5, HAVAL. ...

AxCrypt

2.1.1494 download

... for Windows Vista or later using the AES algorithm with 256-bit or 128-bit keys. It combines strong symmetric encryption with compression and double-click editing/viewing. Encrypted files have a '.AXX' extension ...

Python Encryption Library

9.5.0.98 download

... binary data. Python Encryption Library implements symmetric encryption algorithms: Rijndael, Blowfish, Twofish. Also provides public-key encryption and ... RC2, ARC4, DES, 3DES, PBES1, PBES2. * Hash Algorithms: SHA-1, SHA256, SHA384, SHA512, MD2, MD4, MD5, HAVAL. ...

Free MD5 SHA1 Verifier

1.41 download

... verify checksums (hash) of downloaded files. Supports MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512. Key Features: The program has a convenient user ... any file. Verify file checksum. Supports most hashing algorithm: MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512. Works ...

Hash Codes

1.62.780.7200 download

... supports: Adler32, CRC32, CRC64, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320 or Whirlpool algorithm. Features: Hash data from keyboard, file ... CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, ...

Cryptnos

1.3.3 download

... and runs this data through a cryptographic hash algorithm to produce a password that is unique, lengthy, ... repeatable “passphrases” using a variety of cryptographic hash algorithms Supported hashing algorithms: MD5, SHA-1, SHA-256, SHA-384, SHA-512, ...

Appnimi SHA256 Decrypter

3.8.6 download

... Above all it is FREE. The Secure Hash Algorithm is one of a number of cryptographic hash ... signature for a text or a data file. SHA-256 algorithm generates an almost-unique, fixed size 256-bit hash. ...