TSM Inc.
Company Homepage: http://www.crypto-central.com/
Design, explore and maintain databases, build compound SQL query statements, manage database user rights, and manipulate data fast and convenient.
Total 8 products
Components > Security > Crypting Other
By TSM Inc..
Freeware 05 Sep 2006Description
Delphi implementation of the popular and fast 'Blowfish' algorithm by Bruce Schneier. Blowfish is royalty free and does not have any known weaknesses. The algorithm is royalty free. Features: ECB, CBC, CFB and OFB modes of operation Automatically handles all padding of the input High- …Informations
- Status: Fully functional
- Source: On purchase/registration
- Source price: $99
- Size: 926 kB
Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6
Components > Security > Crypting Other
By TSM Inc..
Freeware 05 Sep 2006Description
The original RSA algorithm conveniently packaged as a Delphi component. The RSA component has been a long time in the making, but we hope that you will find that it meets the promises we have made for it. Features: Supports 512, 1024 and 2048 bit keys Compatibility to standard RSA keys (example …Informations
- Status: Fully functional
- Source: On purchase/registration
- Source price: $99
- Size: 773 kB
Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6
Components > Security > Shareware
By TSM Inc..
Commercial 05 Sep 2006Description
SLockPK uses the power of public key encryption to protect your software. Recognized by experts as the only secure way to protect software, public key crypto provides a level of security higher than hardware dongles, but using only software. Features: Public key encryption (RSA) for highest …Informations
- Status: Fully functional
- Source: On purchase/registration
- price: $89
- Source price: $249
- Size: 2 341 kB
Platforms: CB4, CB5, CB6, D5, D6, D7
Components > Security > Crypting
By TSM Inc..
Freeware 04 Jan 1999Description
Twofish is the AES candidate from the team lead by Bruce Schneier, author of the famous Blowfish algorithm. Twofish is designed for maximum speed and flexibility and is set to become the leading algorithm for the next decade. One advantage of Twofish over other AES candidates is that the algorithm is not now, …Informations
- Status: Fully functional
- Source: On purchase/registration
- Source price: $99
- Size: 779 kB
Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6
Applications in Delphi and BCB > Internet > Mail
By TSM Inc..
02 Aug 1999Description
DataMail allows you to quickly and easily create a mail distribution using a similar method to the "MailMerge" function in Microsoft Word. Where the Word MailMerge allows you to create printed letters, DataMail lets you do the same for eMail, meaning you can stay in contact with a large number of …Informations
- Status: Evaluation (time-limit)
- Source: N/A
- price: $20
- Size: 368 kB
Platforms: NT4, W2K, W95, W98,
Applications in Delphi and BCB > Security > Passwords
By TSM Inc..
Freeware 21 Sep 1998Description
Password Guardian keeps track of your passwords. Password Guardian uses Blowfish encryption which has stood the test of time and has proved itself to be reliable. There are no known methods of breaking Blowfish encryption, an important point as many will have heard by now that DES (Data Encryption …Informations
- Status: Fully functional
- Source: None
- Size: 218 kB
Platforms: NT4, W2K, W95, W98,
Components > Security > Crypting Other
By TSM Inc..
Freeware 05 Sep 2006Description
Delphi implementation of Elliptic Curve public key encryption. Elliptic Curves offer the best public key security with the smallest possible key length. The elliptic curve problem is considered to be significantly harder to solve than RSA, and can therefore offer a comparable level of strength in …Informations
- Status: Fully functional
- Source: On purchase/registration
- Source price: $99
- Size: 503 kB
Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6
Components > Security > Crypting
By TSM Inc..
Freeware 05 Sep 2006Description
Delphi implementation of the MD5 message digest algorithm. MD5 provides a 128 bit cryptographically secure hash (Message Digest) of a given input. MD5 was one of the first generally accepted cryptographically secure hashes, and is still widely in use today. Features: 160 bit hash length Offers high- …Informations
- Status: Fully functional
- Source: On purchase/registration
- Source price: $99
- Size: 728 kB
Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6