MAXA Key Exchanger 1.0
MAXA Key Exchanger uses a cryptographic protocol (Diffie-Hellman key exchange) that allows two parties that do not know each other to jointly establish a shared, secret key, over an insecure communications channel (like email or instant messaging). ...
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- SSuite NetSurfer Browser x64
- UltraFileSearch Std
- Pen Drive Recovery Free
- Aiseesoft iPhone Cleaner...
- AnyMP4 Blu-ray Ripper
- Apeaksoft iOS Unlocker
- Apeaksoft Screen Recorder...
- AnyRec Video Enhancer
- Windows Data Files Undelete
- Data Unerase Software
- Mac Removable Media File...
- Data Recovery Software
- Vista Partition Data...
- Softaken MS PowerPoint...
- Verwijderde Bestanden...
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Diffie Hellman Download
-
1Freeware
-
2Puffer 4.0
Use Puffer to securely exchange email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute ...$34.95 -
3HIME: Huge Integer Math and
RSA public key, AES, RC4 secret key encryption, MD5, SHA-512 hash function, random number generation (Blum-Blum-Shub, RSA), Diffie-Hellman, compression, securely erase files. Every programming language that can access a dll can use HIME: C, C++, C#, ...$59.00 -
4Radmin Remote Control 3.5.1
Radmin 3 demonstrates a remarkable increase of security due to its integration with professional developments such as Windows Security, 256 bit AES data encryption for all data transferred, NTLM/Kerberos, modified Diffie-Hellman 2048 bit algorithm ...$49.00
Buy -
5Radmin Communication Server 3.0
For user authentication and session key setups, a modified Diffie-Hellman exchange with a 2048-bit key size is used. All data are encrypted by AES with a 256-bit key size.$175.00 -
6Chilkat MIME 3.0
Create an manipulate MIME and S/MIME messages. -Navigate the MIME message tree structure via the NumParts property and GetPart(index) method. - Retrieve header field names and values. - Add header fields to a MIME message. -Add a detached (clear-text) ... -
7ZeitControl BasicCard Development
With the BasicCard Development Kit, any programmer proficient in BASIC will be programming a smart card in one day, even without prior smart card experience. BasicCard® is the first smart card programmable in BASIC. It is easy to use, open to ...$77.57 -
8Cryptography | Comp. Sc. Engg. 1
Some of topics Covered in this application are: 1) Basics of Cryptography 2) Conventional cryptography 3) Key management and conventional encryption 4) Keys 5) Pretty Good Privacy 6) Digital signatures 7) Digital certificates 8) The OSI Security Architecture 9) Network Security 10) Types of attacks 11) Denial of service attack 12) Smurf Attack 13) Distributed Denial of Service Attacks 14) Security Mechanism 15) A Model for Network Security 16) Symmetric Ciphers 17) Classical SubstitutionTechniques 18) Classical Transposition Techniques 19) Rotor Machines 20) Steganography 21) Block Cipher Principles 22) The Data Encryption Standard 23) Differential Cryptanalysis Attack 24) Cipher and Reverse Cipher 25) Security of DES 26) The Strength of DES 27) Differential and Linear Cryptanalysis 28) Block Cipher Design Principles 29) Finite Fields 30) The Euclidean Algorithm 31) Finite Fields of The Form GF(p) 32) Polynomial Arithmetic 33) Finite Fields Of the Form GF(2n) 34) The AES Cipher 35) Substitute Bytes Transformation 36) Evaluation Criteria For AES 37) ShiftRows Transformation 38) AddRoundKey Transformation 39) AES Key Expansion Algorithm 40) Equivalent Inverse Cipher 41) Multiple Encryption and Triple DES 42) Triple DES with Two Keys 43) Block Cipher Modes of Operation 44) Cipher Feedback Mode 45) Output Feedback Mode 46) Counter Mode 47) Stream Ciphers 48) The RC4 Algorithm 49) Random Number Generation 50) Pseudorandom Number Generators 51) Linear Congruential Generators 52) Cryptographically Generated Random Numbers 53) Blum BlumShub Generator 54) True Random Number Generators 55) Key Hierarchy 56) Key Distribution Centre 57) Transparent Key Control Scheme 58) Controlling Key Usage 59) Confidentiality Using Symmetric Encryption 60) Link versus End-to-End Encryption 61) Key Distribution 62) Traffic Confidentiality 63) Prime Numbers 64) Fermat\\\'s and Euler\\\'s Theorems 65) Testing for Primality 66) The Chinese Remainder Theorem 67) Discrete Logarithms 68) Principles of Public-Key Cryptosystems 69) RSA Algorithm 70) Optimal Asymmetric Encryption Padding 71) Key Management 72) Distribution of Secret Keys Using Public-Key Cryptography 73) Diffie-Hellman Key Exchange 74) Example ...$1.00 -
9Network Management & Security 1
Diffie-Hellman key exchange 72. Man-in-the-Middle Attack on Deffie-Hellman protocol 73. Elliptic curve cryptography 74. Cryptography with Elliptic Curves 75. Digital Signature 76. Digital Signature Standard 77. Kerberos 78. Kerberos Version 4 Authentication ...$1.00 -
10gateProtect Command Center 3.1
509 certificates -3DES, AES (128, 192, 256) -Blowfish (128, 192, 256) -DPD (Dead Peer Detection) -Compression -PFS (Perfect Forward Secrecy) -MD5, SHA1, SHA2 (256, 384, 512) -Diffi Hellman group (1, 2, 5, 14, 15, 16,17,18) -SSL -Site-to-site -Client-to-Site ...$2,995.00 -
11Bopup Messenger for Android 1.10.1
Encryption is based on Diffie-Hellmann key exchange to generate public/private keys and all data is encoded using CAST-128 algorithm. Supported features include user presence status, personal and group chat, offline messaging. Bopup Messenger is primarily ...$9.00
Buy