This page was generated automatically from The Delphi Super Page archive. If you have any remarks concerning this page please do not hesitate to mail me. In your mail please do refer to your unique DSP author ID which is 0002907. This helps me to locate your data records in DSP databse. |
Author/SiteName(Contact) | Home Page | |
TSM Inc. (Brian Palmer) | [email] | [Home] |
|
Files |
[ blownreg.zip ] [ 173,336 bytes ] | [ Freeware ] [ No Source ] [ D2 | D3 | D4 | C3 ] | ||
TSM Inc. provides high quality cryptographic solutions aimed at professional developers and to hobbyists alike. If you need to get cryptography quickly and reliably into your application, then TSM Inc. is the right choice for you. aecBlowfish implements the famous Blowfish algorithm and offers exceptional performance and functionality. Features: - High performance (5.5MB/s on P300) - ECB, CBC, CFB and OFB modes of operation - High level encryption primitives to encrypt - Files - Strings - Blocks - Buffers - Streams - automatic base64 encoding (e.g. for transmission over email) - CBC-MACs - Full source included (commercial version) - 2 years support (commercial registration) - Automatic updates (commercial registration) Changes in Version 1.14b: Performance now 5.5Mb/s on Pentium 300! Added: 14-06-1998/7-06-1999 | Version: 1.14b | Downloads: 7923/7004/39
|
[ rsa_nreg.zip ] [ 145,183 bytes ] | [ Freeware ] [ No Source ] [ D2 | D3 | D4 | C3 ] | ||
TSM Inc. provides high quality cryptographic solutions aimed at professional developers and to hobbyists alike. If you need to get cryptography quickly and reliably into your application, then TSM Inc. is the right choice for you. aecRSA implements the famous RSA public key encryption algorithm and offers very good performance and functionality. TRSA offers key lengths of up to 2048 bits. Features: - High performance - High level encryption primitives to - Encrypt - Decrypt - Sign - Verify - Generate key pairs - automatic base64 encoding (e.g. for transmission over email) - Full source included (commercial version) - 2 years support (commercial registration) - Automatic updates (commercial registration) Added: 29-11-1998/7-06-1999 | Version: 1.01 | Downloads: 3400/3205/9
|
[ esshrtcl.zip ] [ 19,082 bytes ] | [ Freeware ] [ With Source ] [ D2 ] | ||
TShortcutLink Component. A component for extracting information from, and creating, shortcut files. Added: 12-05-1999 | Version: n/a | Downloads: 2360/2360/1
|
[ es_shrtc.zip ] [ 19,742 bytes ] | [ Freeware ] [ With Source ] [ D2 | D3 | D4 ] | ||
TShortcutLink is a non-visible component encapsulating functions for creating shortcut files and extracting the properties of existing ones. This component makes it easy to put a shortcut on the Windows desktop, Start menu, Programs menu, Startup folder, or any other place you choose; and to obtain the properties of an existing shortcut, such as its target. [more] Added: 16-05-1999 | Version: 1.0 | Downloads: 4132/4132/2
|
[ mailbomb.zip ] [ 375,470 bytes ] | [ Freeware ] [ No Source ] | ||
MailBomb allows you to quickly and easily create a mail distribution using a similar method to the #MailMerge# function in Microsoft Word. Where the Word MailMerge allows you to create printed letters, MailBomb lets you do the same for eMail, meaning you can stay in contact with a large number of contacts quickly and easily Added: 1-08-1999/2-08-1999 | Version: n/a | Downloads: 1267/1267/2
|
[ slpknreg.zip ] [ 1,480,076 bytes ] | [ Shareware ] [ No Source ] | ||
Protect your software with the power of public key encryption. PK encryption is recognized by experts as the only secure way to protects software. SLockPK provides a greater level of protection than hardware dongles, but is a sofware only solution. Also allows online registration. Protect your investment! Please only create a link the the archive on our site if possible - I will be updating regularly, so this will save effort for you and me! Added: 5-09-1999 | Version: 2.00 | Downloads: 815/815/0
|
[ twoffree.zip ] [ 796,247 bytes ] | [ Freeware ] [ No Source ] [ D6 ] | ||
aecTwofish - advanced encryption component - Twofish encryption Twofish is the AES candidate from the team lead by Bruce Schneier, author of the famous Blowfish algorithm. Twofish is designed for maximum speed and flexibility and is set to become the leading algorithm for the next decade. One advantage of Twofish over other AES candidates is that the algorithm is not now, nor never will be under any patent restrictions. Features: Cost (without source code): Free! Added: 24-03-2002 | Version: 1.15 | Downloads: 822/822/2
|
[ SHA_free.zip ] [ 618,401 bytes ] | [ Freeware ] [ No Source ] [ D6 ] | ||
aecSHA - advanced encryption component- Secure Hash Algorithm Delphi implementation of the Secure Hashing Algorithm. The 160 bit hash produced by SHA is 'cryptographically secure', that means the input cannot be calculated from the output. A common use of SHA is for securely storing passwords in a way that neither requires a time consuming encryption nor ever reveals the stored password - an example of this is included in the archive. Features: Cost (without source code): Free! Added: 24-03-2002 | Version: 1.15 | Downloads: 896/896/1
|
[ rijnfree.zip ] [ 1,380 bytes ] | [ Freeware ] [ No Source ] [ D6 ] | ||
aecRijndael - advanced encryption component - Rijndael (AES) encryption Delphi implementation of the new standard algorithm as chosen in the recent AES competition. Rijndael was chosen from a panel of 15 different algorithms from top crypto experts, and has received a large amount of attention from cryptoanalysts in recent months. As of now, this is our recommended algorithm for symmetric encryption. The algorithm is patent and royalty free. Features: Cost (without source code): Free! Added: 24-03-2002 | Version: 1.16 | Downloads: 0/0/0
|
[ elipfree.zip ] [ 513,857 bytes ] | [ Freeware ] [ No Source ] [ D6 ] | ||
aecEllipticCurve - advanced encryption component- Public Key Encryption based on Elliptic Curves Delphi implementation of Elliptic Curve public key encryption. Elliptic Curves offer the best public key security with the smallest possible key length. The elliptic curve problem is considered to be significantly harder to solve than RSA, and can therefore offer a comparable level of strength in much shorter bit lengths. Features: Cost (without source code): Free! Added: 24-03-2002 | Version: n/a | Downloads: 1026/1026/10
|
[ DES_free.zip ] [ 755,834 bytes ] | [ Freeware ] [ No Source ] [ D6 ] | ||
aecDES - advanced encryption component- DES Delphi implementation of the 'old faithful' of the block encryption algorithms. DES has a relatively short key length of 56 bits, but has stood the test of time to show that the quickest attack on DES is to search the entire keyspace for the correct key. DES is the most thoroughly inspected block ciphers. Features: Cost (without source code): Free! Added: 24-03-2002 | Version: n/a | Downloads: 1162/1162/8
|
© 1995-2006 Robert M. Czerwinski ( The Delphi Super Page a.k.a. DSP ). All rights reserved. |