Home > By category > Security & Privacy >Other > linux cryptography library



linux cryptography library

  • Downloads: 
  • Views: 
  • Rating:

I needed a library of functions that enabled me to perform hash functions and symmetric cryptography. I chose MD5 initially but eventually chose SHA as the hashing algorithm due to concerns regarding the \'collision resistance\' of MD5 due to weakne

linux cryptography library License - GNU Library or Lesser General Public License (LGPL)

Free download from Shareware Connection - I needed a library of functions that enabled me to perform hash functions and symmetric cryptography.

Publisher: Lclib | License: Freeware | Price: 0.00
Version: b.0.1.0 | Size: 724 KB | Platform: Linux, Unix
Released Date: | Rating: 0 | Title: linux cryptography library

Author Url: http://lclib.sourceforge.net
Program Info Url: http://lclib.sourceforge.net
Download Url: http://sourceforge.net/projects/lclib/files/latest/download?source=directory

linux cryptography library related downloads:

jPBC - jPBC is a lightweight tool that provides you with a Java version of the PBC cryptography library, originally written in the C programming language.

L3D - A Linux 3D Engine/Library (OpenGL) - L3D is a 3D library for developing OpenGL applications under Linux. The library has a mail event loop with callbacks and Camera And Path Classes exist to produce cinematic camera movement.

jPBC for Windows - A Java equivalent for the PBC cryptography library,

Portal.CLI Linux Bindings - This project encompasses a group of Linux API library bindings targeting the Common Language Runtime, as defined by ECMA335 and ISO/IEC23271.

OpenSSL - By using the Open SSL library, developers can write applications that take advantage of Secure Sockets Layer (SSL v2/v3), Transport Layer Security (TLS v1).

Shareware Connection periodically updates pricing and software information of 'linux cryptography library' from company source 'Lclib' , so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft,  Using 'linux cryptography library' crack, password, serial numbers, registration codes, key generators is illegal and prevent future development of linux cryptography library.

New Reviews

Trend Micro HouseCall - With time, PC users find it increasingly difficult to keep their systems free of malware and rogue apps, despite using latest and feature packed security software. This is mostly owing to the evolving nature of malware and newer types of ...

360 Internet Security - Using a computer without having capable Security software installed is equivalent to sleeping with your house’s main door wide open. Whether you use a PC at home or manage a network of computers at the workplace, PC security suite has ...

Menu Uninstaller Ultra - For every Windows user it becomes necessary to remove some programs after prolonged usage. It can be necessary to free up disk space or the app may not simply suit the needs any more. Whatever is the reason, you need to uninstall third party apps ...

Any Video Converter Free for Mac - Apple does have some stellar media applications for users of Mac OS but at times, you may feel the need for using third party apps too. Its FCP is regarded as an industry leading and powerful video editor but average Mac users may not need such a ...

Xvirus Personal Guard - Nowadays, it is quite risky to use a computer without having suitable security suite or antivirus installed in it. Your computer’s security can be breached any moment without a suitable antivirus or Internet security software. There are so ...

Xion Audio Player - People use computers for various reasons including official work and entertainment. However, it is quite natural for a workaholic to play music files to alleviate boredom at times. If you have no penchant for the WMP bundled with your copy of ...

Internet Explorer 10 - Up to the late 1990s, the web browser used by the bulk of Windows users was invariably Internet Explorer while Netscape played the second fiddle. The scene was relatively identical post 2000 but emergence of Firefox and later Google Chrome ...

SoftAmbulance Free Eraser - Windows comes with a set of integrated utilities to let users maintain and cleanup their computers. While you can always delete files and folders from partitions, that is not a fail proof method. The data remains on hard disk in reality and any ...

dMaintenance - As a computer user, you may need to deal with several types of applications. For a lot of Windows users, the integrated tools of the OS may not suffice at times. They may need to use several third party apps for needs such as entertainment, ...

Google Drive - In last few years, the popularity and proliferation of Cloud storage and usage has shot up considerably. Everyone, including a teenager to a network administrator is using some type of cloud based data storage. You can opt for both free and paid ...




New Downloads

Protected Folder

Protected Folder is designed
to password-protect your
folders and files from being
seen, read or modified.
Whether you ...

EncryptStick Mac

EncryptStick will store,
protect, synchronize and
securely backup your data,
with military grade
encryption. Join the ...

ESET® Cyber Security Pro

ENJOY YOUR TIME ONLINE Our
powerful Internet security
adds layers of
protection—with Firewall and
Parental ...

Efficient Password Manager
Network

Efficient Password Manager
Network is a powerful password
management application. It is
specially designed for small
to ...

Faronics Anti-Executable
Standard

Anti-Executable offers a
revolutionary method to keep
users on task and highly
productive.

Netwrix Privileged Account
Manager

Privileged Account Manager
secures and audits all
operations with privileged
passwords, randomizing them on
a scheduled ...

east-tec SafeBit

east-tec SafeBit 2 features
military strength on-the-fly
AES encryption, by creating
virtual drives, where you can
hide ...

Stop Cut

its way to stop ARP attack in
your ARP tables , and stop
spoofing from others in your
local area network by using
...

Spy Emergency Spyware
Remover

Anti-Spyware, Anti-Virus,
Anti-Spam Solution that fast
and secure removes spyware,
viruses, spam and other
malware from ...

ESET Mobile Security

Protect Your Smartphone ESET
delivers award-winning
protection with built-in
antispam, firewall and
antitheft features ...

Metasploit Community

Metasploit Express is an
affordable, easy-to-use
penetration testing solution
powered by Metasploit, the
world’s ...

Windows Security Tweaker

It enables you to protect and
totally control access to you
PC