+
+

Related Products

  • CLEAR
    1 Rating
    Visit Website
  • netTerrain DCIM
    24 Ratings
    Visit Website
  • LM-Kit.NET
    23 Ratings
    Visit Website
  • JOpt.TourOptimizer
    8 Ratings
    Visit Website
  • MEXC
    188,765 Ratings
    Visit Website
  • CompUp
    66 Ratings
    Visit Website
  • Level 6
    35 Ratings
    Visit Website
  • PathSolutions TotalView
    43 Ratings
    Visit Website
  • QueryPal
    2 Ratings
    Visit Website
  • Proton Pass
    31,996 Ratings
    Visit Website

About

cryptography includes both high-level recipes and low-level interfaces to common cryptographic algorithms such as symmetric ciphers, message digests, and key derivation functions. Encrypt with cryptography’s high-level symmetric encryption recipe. cryptography is broadly divided into two levels. One with safe cryptographic recipes that require little to no configuration choices. These are safe and easy to use and don’t require developers to make many decisions. The other level is low-level cryptographic primitives. These are often dangerous and can be used incorrectly. They require making decisions and having an in-depth knowledge of the cryptographic concepts at work. Because of the potential danger in working at this level, this is referred to as the “hazardous materials” or “hazmat” layer. These live in the cryptography.hazmat package, and their documentation will always contain an admonition at the top.

About

Designed to be used with our entire suite of iCrypto cloud-based services, the iCrypto SDK can integrate into existing Enterprise Apps or when deployed as iCrypto App be used as a standalone one-step password-less verification solution. By employing the latest cryptography technologies in combination with device-level security and management, the iCrypto SDK is the ultimate software token that can be used as a biometric ID on the go in a wide variety of industries. iCrypto SDK provides authenticator PKI signatures, a range of cryptographic protocols such as TOTP/HOTP/OCRA/MTP, push-based authentication, on-device as well as network-based biometrics such as fingerprint, iris scan, face/voice/eyeball recognition, third-party authorization, secure storage, context collection and host of security features.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Anyone seeking a tool to create cryptographic algorithms such as symmetric ciphers, message digests, and key derivation functions

Audience

Businesses lookign for a Biometric Authentication solution to eliminate risks such as identity theft, access breaches, data breaches

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

Free
Free Version
Free Trial

Pricing

Free
Free Version
Free Trial

Reviews/Ratings

Overall 4.0 / 5
ease 5.0 / 5
features 5.0 / 5
design 5.0 / 5
support 5.0 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

cryptography
Founded: 2013
cryptography.io/en/latest/

Company Information

iCrypto
Founded: 2012
United States
icrypto.com

Alternatives

Alternatives

Say-Tec

Say-Tec

Finnovant
Ergo

Ergo

Ergo Platform
Nexsign

Nexsign

SAMSUNG SDS
It'sMe

It'sMe

Acceptto

Categories

Categories

Integrations

No info available.

Integrations

No info available.
Claim cryptography and update features and information
Claim cryptography and update features and information
Claim iCrypto and update features and information
Claim iCrypto and update features and information