Now livetag icon
The future of market intelligence is here. Meet AI Studio — your AI-powered Similarweb expertLearn morebanner icon

Cryptography análises de aplicativos para 11 de fevereiro

Cryptography

Cryptography

  • Nitramite
  • Google Play Store
  • Gratuitos
  • Ferramentas
Unlock the World of Cryptography! Cryptography is your all-in-one toolkit for exploring, learning, and experimenting with encryption, ciphers, hashing, and encoding methods. Whether you're a beginner or an expert, this app offers a wide range of tools and resources for everyone. ⭐ Your Feedback Matters! Love the app? Rate us 5 stars! Have suggestions? Share your feedback to help us improve. Source code: https://github.com/norkator/cryptography Ciphers • Scytale cipher. • Polybius Square. • Atbash cipher. • Caesar cipher. • Rot 1 - 25 cipher. • Affine cipher. • Rail Fence cipher. • Keyword cipher. • Beaufort cipher. • Templar Cipher with image send feature. • Porta cipher. • Vigenere cipher. • Gronsfeld cipher. • Autokey cipher. • Bacon Cipher. • Chaocipher. • Adfgvx cipher. • Playfair cipher. • Two-Square cipher (currently encrypt). • Tri-Square cipher (currently encrypt). • Four-Square cipher (currently encrypt). • One-time pad. • BIFID cipher. • Trifid cipher. • Hill Cipher with editable Matrix. • Visual Cryptography. • Enigma cipher with saveable settings. • RSA cipher with custom keys • Blowfish cipher • Twofish cipher (next gen Blowfish) • Threefish cipher • Rijndael (AES) cipher • SCrypt (Password-based key derivation function, in progress) • Elliptic Curve Diffie-helleman AES, similar to Curve25519 • ChaCha cipher (Salsa20) • Cast5 • Cast6 • Shacal2 • Shamir's Secret Sharing (SSS) algorithm. • RC2 • RC4 • RC5 • RC6 • Triple DES • Serpent • SkipJack • ElGamal • Anubis. • Khazad. • IDEA. • ARIA. • Navajo. • Mary, Queen of Scots. .. and more! Hashes • Whirlpool 0 / 1 / W (hashing) • HMAC - SHA1 / SHA256 / SHA512 (advanced hashing) • Adler32 (hashing) • CRC - 8 / 16 / 24 / 64 (hashing) • ELF-32 (hashing) • FCS-16 (hashing) • HAS-160 (hashing) • MD-2/4/5 (hashing) • RIPEMD - 128 / 160 / 256 / 320 (hashing) • SHA - 0 / 1 / 2-224 / 2-256 / 2-384 / 2-512 / 3-224 / 3-256 / 3-384 / 3-512 (hashing) • Shake 128 / Shake 256 • Tiger - T / T2 / 128 / 160 (hashing) • Sum - 8 / 16 (hashing) • Xor8 (hashing) • GOST (hashing) • BCrypt (hashing) • PBKDF2 (hashing) with java|php example. • SipHash hashing algorithm. • Skein hash. • Keccak hash. • Argon2 hash. (remote api) • Blake2b • SM3 hash. • Kupyna | DSTU7564. Encodings • Base16 (same as Hexadecimal) • Base32 • Base58 • Base64 • Base85 | Ascii85 • Base91 • Morse code encoder with sound playback. Sound may be annoying. • Braille • Semaphore • Tap Code • ASL (American Sign Language) • Pigpen • Elian Script • Betamaze • A1Z26 • T9 • RLE - Run-length encoding • Webdings and Wingdings. • Pig Latin. Post-Quantum • NTRU Tools • Unknown cipher tool. • WhatsApp message decipher tool. • Anagram solver tool. • Password generator tool. • Checksum tool for text and files. • Custom Hmac SHA 1/256 + SHA256 password authentication digest creator tool. (java|php examples) • File Encryption Tool. Read tutorial from links which are included in explanation view or in tool question mark. • Hash Cracker resources. • Password Strength checker tool. • Frequency Analysis. • ASCII table (8-bit/255) with search function. • Binary, Hexadecimal, Decimal and Octal table with search function. • Text <> Binary converter. • Decimal <> Binary converter. • Hexadecimal <> Binary converter. • Integer(number) <> Binary converter. • Hex <> Ascii converter. • Pseudo Random Number Generator (PRNG) with explanation. • AFSK (Audio Frequency-shift keying) generator. Receiver comes in future releases. • Steganography, encrypt decrypt tool in build. • ASCII Font Art tool. • Normal QR Code generator. • Normal QR code reader (camera or image) • Nato phonetic alphabet. Algorithms • Blum Blum Shub generator. • Haversine formula. Links Contact: http://www.nitramite.com/contact.html Eula: http://www.nitramite.com/eula.html Privacy: http://www.nitramite.com/privacy-policy.html
Cryptography

Cryptography classificação de uso

A classificação de uso é baseada no algoritmo da Similarweb que calcula as instalações atuais e os usuários ativos ao longo de um período de 28 dias.

Todas as categorias em
Estados Unidos--
Ferramentas em
Estados Unidos--

Usuários ativos diariamente

Analise os padrões de uso dos usuários de Cryptography visualizando os downloads de Cryptography e os usuários ativos diários ao longo do tempo.

Usuários

Analise os padrões de uso dos usuários de Cryptography visualizando os downloads de Cryptography e os usuários ativos diários ao longo do tempo.

Unlock daily active users
11ez.jan.fev.

Cryptography Estatísticas de classificação ao longo do tempo

"Ranking de Uso do Similarweb e Ranking de Google Play Store para Cryptography

Ranking de Uso

Classificação

Cryptography Classificação por país

Países nos quais Cryptography tem a classificação mais alta em suas principais categorias

Nenhum dado para exibir

Interesses dos Usuários e Principais Categorias

Principais categorias e aplicativos usados pelos usuários do Cryptography

Nenhum dado para exibir

Principais concorrentes e aplicativos alternativos

Aplicativos com alta probabilidade de serem usados pelos mesmos usuários, da mesma loja.

WEquil App

WEquil App

WEquil app

NEC Electrical Exam by Dakota

NEC Electrical Exam by Dakota

Dakota Prep

CompTIA Security+ Exam Prep

CompTIA Security+ Exam Prep

Easy Prep

SkillCat: HVAC School, EPA 608

SkillCat: HVAC School, EPA 608

SkillCat

Cryptography VS.

fevereiro 11, 2026