Top 15 libgfshare-bin Alternative and Similar Softwares | Nov 2024

This library implements what is known as Shamir Secret Sharing. This
entails encoding a secret as an integer and then constructing a
polynomial whose coefficients are random and calculating coordinate
pairs along the resultant curve. These coordinate pairs are considered
'shares' and by controlling the order of the polynomial we can control
the number of shares required to be able to recover the secret.

In this manner we can split a secret into any 'C' shares, any 'T' of
which can be used to recover the secret.

1. ssss

ssss ssss is an implementation of Shamir's secret sharing scheme for UNIX/linux machines. It is free software, the code is licensed under the GNU GPL v2. ssss does both: the generation of shares for a known secret and the reconstruction of a secret using user provided shares. The software was written......

2. Shattr.it

Shattr.it Shattr is a website where you can split your secrets into several shards such that if a certain number of them are combined, the secret can be recovered, but otherwise, no information about the secret can be obtained. (......

3. iSteg

iSteg iSteg is an encryption tool used to hide a file (for example a zip archive) inside a jpeg picture. This encryption technology is called steganography. iSteg is a frontend for the opensource tool outguess 2.0. iSteg can be used to both encode and decode a hidden file.......

4. Cryptix

Cryptix Cryptix is a complete solution to study cryptography, encoding and ciphers. Hide your datas, encrypt your texts and documents.Cryptix contains password generators, Mnemonic, .htpasswd generator, RSA 512 bits key generator, Wordlist generator and numerous security tools.......

5. USBCrypt

USBCrypt Password protection and strong encryption of the external and internal drives, flash drives, backup drives, etc.......

6. abylon BASIC

abylon BASIC The security of sensitive data is often neglected. But the encryption of diaries, pictures or other secret documents is so simply. abylon BASIC is a collection to encrypt, sign, compress, search, copy, mail or move files and folders, full integrated into the context menu of the File Explorer. The encryption......

7. fciv

fciv The File Checksum Integrity Verifier (FCIV) is a command-prompt utility that computes and verifies cryptographic hash values of files. FCIV can compute MD5 or SHA-1 cryptographic hash values. These values can be displayed on the screen or saved in an XML file database for later use and verification.......

8. hashdeep

hashdeep Computes the MD5, SHA-1, SHA-256, Tiger, or Whirlpool message digest for any number of files while optionally recursively digging through the directory structure. Can also match input files against lists of known hashes in a variety of formats.......

9. GPG Keychain Access

GPG Keychain Access GPG Keychain Access is an open source application for Mac OS X. It allows the user to manage OpenPGP keys, e.g. creating, adjusting and verifying keys and communication with the key servers.......

10. EDS (Encrypted Data Store)

EDS (Encrypted Data Store) With EDS (Encrypted Data Store) you can store your files in the encrypted container to prevent unauthorized access to sensitive information. TrueCrypt container files are supported.Main features:* Supports AES, Serpent, Twofish encryption algorithms.* SHA-512, RIPEMD-160, Whirlpool hash algorithms.* Encrypt/decrypt any kind of file.* TrueCrypt compatible container files.* All the......

11. TruPax

TruPax TruPax generates TrueCrypt - compatible container files from arbitrary sets of files and folders. Such files match exactly the size of the contained material and can be mounted by TrueCrypt, but also directly extracted using TruPax itself. Latter also works for containers formatted with FAT32 by TrueCrypt itself,......

12. GoAnywhere OpenPGP Studio

GoAnywhere OpenPGP Studio GoAnywhere OpenPGP Studio™ is a free desktop tool that makes it easy to protect sensitive files using the popular Open PGP encryption standard. Documents can be encrypted, decrypted, signed and verified from your PC or workstation using this intuitive tool. An integrated key manager allows you to quickly create, import,......

13. Encrypted Notepad

Encrypted Notepad Encrypted Notepad is a very simple to use application providing state of the art industrial-strength encryption to users who want nothing more than to store sensitive information in text documents. Users can be completely at ease in the security provided by Encrypted Notes because it follows best practices in dealing......

14. DocWallet

DocWallet Your personal document lock box. Securely stored and always at hand.You can finally access your confidential documents from anywhere in the world - securely encrypted, perfectly synchronized, and amazingly practical - with DocWallet, the free document manager from Deutsche Post AG, for iPhone, iPad, Mac and PC.......

15. FileVault

FileVault FileVault is a method of using encryption with volumes on Mac computers. Encryption and decryption are performed on the fly.FileVault 2 uses full disk, XTS-AES 128 encryption to help keep your data secure. Using FileVault 2, you can encrypt the contents of your entire drive.......