aes in Encryption Tools downloads

Paranoia Text Encryption for Mac

15.0.4 download

... readers. Texts are encrypted using strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish 448bit, ... versions are available: homepage A web-based version (client-side AES) is available on: homepage ...

Paranoia Text Encryption for PC

15.0.4 download

... readers. Texts are encrypted using strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish 448bit, ... versions are available: homepage A web-based version (client-side AES) is available on: homepage ...

Passtracker

2.2 download

Passtracker enables you to keep all of your passwords in one easily accessible place. Store your membership website, FTP account, game server, etc., account information. This is much better then writing ...

PDF Postman

2.5.423 download

... will protect your message and file attachments using AES-256 strong encryption that is compatible with major PDF viewers, such as Adobe Reader. Encrypted PDF files are easy on recipients, since ...

PDF Postman Email Encryption for Outlook

1.4 download

... will protect your message and file attachments using AES-256 strong encryption that is compatible with major PDF viewers, such as Adobe Reader. Encrypted PDF files are easy on recipients, since ...

PenProtect

1.45 download

PenProtect is the most comprehensive and secure solution to protect the files within your USB Flash Drive, Flash Memory or Pen Drive.Files are encrypted and protected using your Password and a ...

5 award

Plain Sight

1.0 download

... within other files using military strength 256 bit AES encryption. For example you can hide your passwords inside your favorite vacation photo. The file you choose to hide inside ...

PocketCrypt

2.0 download

... to the "virtual directory" is encrypted with the AES algorithm. With the PocketCrypt, you get a device named PCC VIEWER, that which allows the user to manage all the encrypted ...

Portable TrueCrypt

7.1a download

... and hidden operating system. * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. ...

PowerCryptor Encryption Suite

1.05 download

... and supports the most secure encryption algorithms, including AES 256-bit. Encryption with PowerCryptor is easy to do and completely transparent. To password protect your file or folder, just right-click on ...

PrimaSoft Encryption - Service Edition

1.0 download

... for any future date and time. Encryption algorithms: AES (US Advanced Encryption Standard) secret-key encryption algorithm known ... by National Institute of Standards and Technologies (NIST). AES is the new official US government standard for ...

PrivateUSB

1.0.3 download

... encrypted, secure PrivateUSB. Features include: a PrivateUSB folder, AES-256 military grade file encryption, secure file backups on the PrivateUSB servers, and easy to use. PrivateUSB is used by corporate professionals, ...

Protectorion ToGo

4.0.0.83 download

... from misuse. Protectorion ToGo features on-the-fly encryption with AES 256 bit, access encrypted data and passwords from any Windows PC, integrated password protection and password security index, and strong protection ...

ProxyCrypt

2.6.3 download

... compatible with Arsenal Image Mounter. Features: - Supports AES-256, Serpent and SHACAL-2 ciphers. - Cascade encryption with ... (more than 260 characters). - Performances improved with AES instructions, SSE2 optimizations and asynchronous read/write. - Available ...

PureVPN Windows VPN Software

13.3.0.5 download

... you have the best streaming experience. Strongest Encryption AES 256-bit, military-grade encryption comes as a default with PureVPN to ensure optimal data protection. Multiple VPN Protocols Multiple VPN protocols are ...

QILING Safe Disk Standard

2.2 download

... Algorithm: Safe Disk uses Blowfish (448 bit keysize), AES (256 bit keysize), GOST (256 bit keysize) and 3DES (168 bit keysize). ...

Rohos Disk Encryption

2.2 download

... data, and restricts access to them. Rohos Disk's AES 256-bit encryption protects you against viruses, spyware and ... learn basic Rohos features. Rohos Tech Specs: - AES encryption with up to 256-bit keys. Blowfish. GOST. ...

Rohos Disk Encryption

3.2 download

... On-the-fly disk encryption Rohos disk uses NIST approved AES encryption algorithm, 256 bit encryption key length. Encryption is automatic and on-the-fly. No risk of data loss Partition password reset ...

Rohos Disk Encryption

3.2 download

... On-the-fly disk encryption Rohos disk uses NIST approved AES encryption algorithm, 256 bit encryption key length. Encryption is automatic and on-the-fly. No risk of data loss Partition password reset ...

S.S.E. File Encryptor for Mac

15.0.6 download

... window. Files are encrypted using strong encryption algorithms: AES (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro Version) ...

S.S.E. File Encryptor for PC

15.0.6 download

... window. Files are encrypted using strong encryption algorithms: AES (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro Version) ...

SafeDRM Video Protection

1.10 download

... PDF files are supported. High-level Encryption: With 256-bit AES encryption and advanced video encoding algorithm, more secure and reliable! Prevent Screen Recording and Screenshots:Automatically identify various known and unknown screen ...

Safeguard Enterprise PDF DRM

5.0.40 download

... Locklizard PDF security uses public key technology with AES 256 bit encryption and a real-time web based licensing system. ...

Safeguard PDF Security

4.0.23 download

... Locklizard PDF security uses public key technology with AES 256 bit encryption and a real-time web based licensing system. There are no PDF passwords for users to enter, manage, forget ...

Sealpath

1.0.5 download

... under control. SealPath uses a symmetric key with AES algorithm of encryption to ensure that your documents are under control. This symmetric key is obtained through a private RSA key ...