Rotation Hash Algorithms
- Downloads:
- Views:
- Rating:

GPL hash functions with various ouput sizes.
Free download from Shareware Connection - GPL hash functions with various ouput sizes.
Version: 0.0.1 | Size: 83 KB | Platform: Linux, Mac OS X, WinOther
Released Date: 22-10-2012 | Rating: 0 | Title: Rotation Hash Algorithms
Author Url: http://rha.sourceforge.net
Program Info Url: http://rha.sourceforge.net
Download Url: http://sourceforge.net/projects/rha/files/
Cryptainer LE Gratis Encryptie Software
Hotspot Shield Elite
Folder Lock Free
SmartHide
Folder Password Expert
Touch Hider for S60 E5/Symbian ^3
Touch Crypto for S60 E5
Touch Hider for S60 E3
GiliSoft USB Stick Encryption
CryptoForge
Touch Crypto for S60 E5/Symbian^3
USB Encryptor
imlSoft USB Disk Guard
File Encryption XP
JDigesterCheck - Windows installer - JDigesterCheck GUI and SDK, HashDigester .jar library - Get hash algorithms in your applications. Java extension contains classes implementing SHA 1, SHA 224, SHA 256, SHA 384, SHA 512, RIPEMD 128, RIPEMD 160, RIPEMD 256, RIPEMD 320 hash algorithms
JDigesterCheck - Mac OS X installer - JDigesterCheck, Mac OS X install GUI and SDK, JHashDigester .jar library - Hash algorithms for applications. Java extension implements SHA 1, SHA 224, SHA 256, SHA 384, SHA 512, RIPEMD 128, RIPEMD 160, RIPEMD 256, RIPEMD 320 algorithms
iHashDigester - DiceLock Security iHashDigester '.a' static library - iOS 5 systems - Incorporate hash algorithms in your applications. C++ '.a' static library implementing SHA 1, SHA 224, SHA 256, SHA 384, SHA 512, RIPEMD 128, RIPEMD 160, RIPEMD 256, RIPEMD 320.
Generic Hash and HMAC Program - Hash and HMAC command line tool for many hash algorithms like sha1 sha224 sha256 sha384 sha512 md2 md4 md5 rmd128 rmd160 rmd256 rmd320 whirl gost lash160 lash256 lash384 lash512 tiger2 and RFC 2104 HMAC support
I Have The Power - I Have The Power is a small, easy to use application specially designed to demonstrate the numerical enormity, in a human readable way, of large hash algorithms like MD5 (128 bits), SHA1 (160 bits), SHA256 (256 bits) and SHA512 (512 bits).
Shareware Connection periodically updates pricing and software information of 'Rotation Hash Algorithms' from company source 'rha.sourceforge.net' , so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft, Using 'Rotation Hash Algorithms' crack, password, serial numbers, registration codes, key generators is illegal and prevent future development of Rotation Hash Algorithms.
PictBear - Nowadays, a majority of PC users resort to digital image editing once in a while. It may be required for retouching image captured in smart phones or for creating an album in Facebook. For some people, tinkering with digital images is a pastime ...
Backup Dwarf Home Edition - Making backups of data and media content has become extremely important for computer users nowadays. Owing to hardware failure, you may end up losing gigabytes of precious data. Besides, you may not want to leave sensitive data accessible to all ...
DriverPack Solution Professional - To keep your laptop or desktop performing well consistently, it is important to pay attention to some aspects. Using top antivirus utility, cleaning up junk feels periodically are some such examples. However, you also need to keep drivers of ...
7-Data Recovery Suite Free Edition - When you are dealing with lots of data it may be necessary at times to recover deleted data. The data may be deleted by mistake or by someone else. In such instances, it becomes necessary to retrieve the deleted data. You need to use third party ...
Norton Identity Safe - Symantec has been one of the most popular and major players in computer security solution for years. Its cutting edge system security products usually come with data security features. However, with its Identity Safe, the company has given users ...
SiSoftware Sandra Lite - People use computers for various needs, including work, entertainment and information seeking. However, a majority of PC users do not bother much about intricate details of their PC’s hardware parts. A section of users are particular about ...
FortiClient Standard - Every computer user needs to have adequate protection for his system and this holds true for corporate and network users. In business setups, where multiple desktops and servers are connected to a network, using regular antivirus suite may be ...
Paint.NET - Nearly every PC user needs to use some type of image editing software nowadays, whether it is for personal or professional reasons. It can be for making minor corrections to your vacation pictures before you share them on social media sites. It ...
Impulse Media Player - To play back media files including media and video content, you need to use suitable software. For a majority of Windows users, the integrated WMP is the default choice. However, you can also pick from so many third party music and media playback ...
Windows Live Family Safety - Using parental control applications has become a necessity for those people who have tech savvy kids and computers at home. In fact, you should use such software even if your kid is not tech savvy. Needless to say, children depend on internet for ...

