the Java Cryptography Architecture (JCA) is a framework for working with cryptography using the Java programming language. It forms part of the Java security...
2 KB (107 words) - 17:08, 30 December 2023
The Java Cryptography Extension (JCE) is an officially released Standard Extension to the Java Platform and part of Java Cryptography Architecture (JCA)...
2 KB (145 words) - 18:55, 5 November 2024
collection of APIs used for implementing cryptography in computer programs. It includes APIs for both the Java and the C# programming languages. The APIs...
9 KB (1,079 words) - 22:38, 29 August 2024
JCA may refer to: Java Cryptography Architecture Java EE Connector Architecture, for connecting application servers and enterprise information systems...
1 KB (186 words) - 18:48, 3 November 2023
Massey • Jan Graliński • Jan Kowalewski • Japanese naval codes • Java Cryptography Architecture • Jefferson disk • Jennifer Seberry • Jerzy Różycki • Joan Daemen...
66 KB (2,911 words) - 02:58, 27 July 2025
Smartcard Microsoft Developer Network page about CSPs. Java Cryptography Architecture - Cryptographic Service Provider IAIK-JCE Cryptographic Service Provider...
5 KB (648 words) - 00:12, 26 March 2025
open-source cryptographic wrapper library for Java Card, enabling low-level cryptographic computations not supported by the standard API. Java Card technology...
16 KB (2,066 words) - 01:59, 25 May 2025
IAIK-JCE (category Cryptographic software)
purposes, evaluation and open-source development. Java Cryptography Architecture Java Cryptography Extension Official website "Newest Releases". 2021-12-24...
2 KB (124 words) - 12:46, 5 July 2024
JSR 5 and JSR 63) Integrated security and cryptography extensions (JCE, JSSE, JAAS) Java Web Start included (Java Web Start was first released in March 2001...
205 KB (11,285 words) - 20:43, 21 July 2025
Comparison of TLS implementations (category Cryptographic software)
15, 2015-03-08 — Botan". 2015-03-08. Retrieved 2015-03-11. "Java Cryptography Architecture Oracle Providers Documentation". docs.oracle.com. "NSS 3.15...
135 KB (4,832 words) - 16:48, 21 July 2025
SmartMX controller (SMX) JCOP v2.2 GlobalPlatform 2.1.1 Java Card 2.2.1 Elliptic Curve Cryptography (ECC) F2M support JCOP Tools Eclipse based JCOP v2.2...
9 KB (1,033 words) - 01:46, 12 February 2025
Below is a list of notable Java programming language technologies (frameworks, libraries)....
17 KB (12 words) - 20:19, 10 December 2024
environments. Java SE was formerly known as Java 2 Platform, Standard Edition (J2SE). The platform uses the Java programming language and is part of the Java software-platform...
35 KB (3,639 words) - 23:11, 28 June 2025
between C and Java. Unsigned large numbers are also used in many numeric processing fields, including cryptography, which can make Java less convenient...
77 KB (8,479 words) - 18:40, 31 May 2025
Network Security Services (category Cryptographic software)
Network Security Services (NSS) is a collection of cryptographic computer libraries designed to support cross-platform development of security-enabled...
13 KB (1,230 words) - 11:04, 13 May 2025
CrypTool (category Cryptography contests)
programming to clarify cryptographic processes. Currently, CT2 contains more than 150 crypto functions. JCrypTool 1.0 (built with Java/Eclipse/RCP/SWT) (abbreviated...
8 KB (616 words) - 21:59, 29 June 2025
In cryptography, a Key Checksum Value (KCV) is the checksum of a cryptographic key. It is used to validate the integrity of the key or compare keys without...
4 KB (463 words) - 01:47, 12 February 2025
Reference Manual: Cryptography Extension". ARM. Retrieved 11 September 2016. "Impact of implemented Exception levels". Learn the architecture - AArch64 Exception...
143 KB (13,766 words) - 08:44, 21 July 2025
XML (formerly Java XML) for Remote Procedure Calls JAXP—Java API for XML Processing JBOD—Just a Bunch of Disks JCE— Java Cryptography Extension JCL—Job...
114 KB (8,053 words) - 23:17, 25 July 2025
Obfuscation (software) (redirect from Cryptographic obfuscation)
reverse-engineering the code is cryptographically hard. This is formalized in the many proposals for indistinguishability obfuscation, a cryptographic primitive that,...
18 KB (1,668 words) - 18:48, 29 May 2025
Shibboleth (software) (redirect from Shibboleth Single Sign-on architecture)
a transaction. Trust between domains is implemented using public key cryptography (often simply TLS server certificates) and metadata that describes providers...
11 KB (1,224 words) - 00:49, 1 July 2025
between C and Java. Unsigned large numbers are also used in a number of numeric processing fields, including cryptography, which can make Java more inconvenient...
32 KB (3,615 words) - 12:28, 8 May 2025
Authenticator (section Cryptographic key)
uses public-key cryptography to interoperate with a WebAuthn client, that is, a conforming web user agent that implements the WebAuthn JavaScript API. The...
30 KB (3,661 words) - 18:03, 24 June 2025
language) – Java Platform, Enterprise Edition – Java Platform, Micro Edition – Java Platform, Standard Edition – Java API – Java – Java virtual machine (JVM)...
17 KB (1,384 words) - 14:26, 28 February 2025
for use in cryptography. Random number generators have applications in gambling, statistical sampling, computer simulation, cryptography, completely...
36 KB (4,424 words) - 00:46, 16 July 2025
Kyber (category Lattice-based cryptography)
trapdoor function. It won the NIST competition for the first post-quantum cryptography (PQ) standard. NIST calls its standard, numbered FIPS 203, Module-Lattice-Based...
15 KB (1,473 words) - 19:11, 24 July 2025
Java Platform, Micro Edition or Java ME is a computing platform for development and deployment of portable code for embedded and mobile devices (micro-controllers...
19 KB (1,444 words) - 01:38, 28 June 2025
Java and C++ are two prominent object-oriented programming languages. By many language popularity metrics, the two languages have dominated object-oriented...
67 KB (6,115 words) - 15:37, 2 July 2025
Galois/Counter Mode as well as misuse resistance in the event of the reuse of a cryptographic nonce. The construction is defined in RFC 8452. AES-GCM-SIV is designed...
4 KB (398 words) - 12:58, 8 January 2025
CUDA (redirect from Compute Unified Device Architecture)
used to accelerate non-graphical applications in computational biology, cryptography and other fields by an order of magnitude or more. CUDA provides both...
85 KB (4,327 words) - 12:10, 24 July 2025