• the Java Cryptography Architecture (JCA) is a framework for working with cryptography using the Java programming language. It forms part of the Java security...
    2 KB (107 words) - 17:08, 30 December 2023
  • The Java Cryptography Extension (JCE) is an officially released Standard Extension to the Java Platform and part of Java Cryptography Architecture (JCA)...
    2 KB (145 words) - 18:55, 5 November 2024
  • collection of APIs used for implementing cryptography in computer programs. It includes APIs for both the Java and the C# programming languages. The APIs...
    9 KB (1,079 words) - 22:38, 29 August 2024
  • JCA may refer to: Java Cryptography Architecture Java EE Connector Architecture, for connecting application servers and enterprise information systems...
    1 KB (186 words) - 18:48, 3 November 2023
  • Massey • Jan Graliński • Jan Kowalewski • Japanese naval codes • Java Cryptography Architecture • Jefferson disk • Jennifer Seberry • Jerzy Różycki • Joan Daemen...
    66 KB (2,911 words) - 02:58, 27 July 2025
  • Smartcard Microsoft Developer Network page about CSPs. Java Cryptography Architecture - Cryptographic Service Provider IAIK-JCE Cryptographic Service Provider...
    5 KB (648 words) - 00:12, 26 March 2025
  • open-source cryptographic wrapper library for Java Card, enabling low-level cryptographic computations not supported by the standard API. Java Card technology...
    16 KB (2,066 words) - 01:59, 25 May 2025
  • IAIK-JCE (category Cryptographic software)
    purposes, evaluation and open-source development. Java Cryptography Architecture Java Cryptography Extension Official website "Newest Releases". 2021-12-24...
    2 KB (124 words) - 12:46, 5 July 2024
  • JSR 5 and JSR 63) Integrated security and cryptography extensions (JCE, JSSE, JAAS) Java Web Start included (Java Web Start was first released in March 2001...
    205 KB (11,285 words) - 20:43, 21 July 2025
  • Comparison of TLS implementations (category Cryptographic software)
    15, 2015-03-08 — Botan". 2015-03-08. Retrieved 2015-03-11. "Java Cryptography Architecture Oracle Providers Documentation". docs.oracle.com. "NSS 3.15...
    135 KB (4,832 words) - 16:48, 21 July 2025
  • SmartMX controller (SMX) JCOP v2.2 GlobalPlatform 2.1.1 Java Card 2.2.1 Elliptic Curve Cryptography (ECC) F2M support JCOP Tools Eclipse based JCOP v2.2...
    9 KB (1,033 words) - 01:46, 12 February 2025
  • Below is a list of notable Java programming language technologies (frameworks, libraries)....
    17 KB (12 words) - 20:19, 10 December 2024
  • environments. Java SE was formerly known as Java 2 Platform, Standard Edition (J2SE). The platform uses the Java programming language and is part of the Java software-platform...
    35 KB (3,639 words) - 23:11, 28 June 2025
  • Thumbnail for Java (software platform)
    between C and Java. Unsigned large numbers are also used in many numeric processing fields, including cryptography, which can make Java less convenient...
    77 KB (8,479 words) - 18:40, 31 May 2025
  • Thumbnail for Network Security Services
    Network Security Services (category Cryptographic software)
    Network Security Services (NSS) is a collection of cryptographic computer libraries designed to support cross-platform development of security-enabled...
    13 KB (1,230 words) - 11:04, 13 May 2025
  • Thumbnail for CrypTool
    CrypTool (category Cryptography contests)
    programming to clarify cryptographic processes. Currently, CT2 contains more than 150 crypto functions. JCrypTool 1.0 (built with Java/Eclipse/RCP/SWT) (abbreviated...
    8 KB (616 words) - 21:59, 29 June 2025
  • In cryptography, a Key Checksum Value (KCV) is the checksum of a cryptographic key. It is used to validate the integrity of the key or compare keys without...
    4 KB (463 words) - 01:47, 12 February 2025
  • Thumbnail for ARM architecture family
    Reference Manual: Cryptography Extension". ARM. Retrieved 11 September 2016. "Impact of implemented Exception levels". Learn the architecture - AArch64 Exception...
    143 KB (13,766 words) - 08:44, 21 July 2025
  • XML (formerly Java XML) for Remote Procedure Calls JAXP—Java API for XML Processing JBOD—Just a Bunch of Disks JCE— Java Cryptography Extension JCL—Job...
    114 KB (8,053 words) - 23:17, 25 July 2025
  • reverse-engineering the code is cryptographically hard. This is formalized in the many proposals for indistinguishability obfuscation, a cryptographic primitive that,...
    18 KB (1,668 words) - 18:48, 29 May 2025
  • a transaction. Trust between domains is implemented using public key cryptography (often simply TLS server certificates) and metadata that describes providers...
    11 KB (1,224 words) - 00:49, 1 July 2025
  • between C and Java. Unsigned large numbers are also used in a number of numeric processing fields, including cryptography, which can make Java more inconvenient...
    32 KB (3,615 words) - 12:28, 8 May 2025
  • uses public-key cryptography to interoperate with a WebAuthn client, that is, a conforming web user agent that implements the WebAuthn JavaScript API. The...
    30 KB (3,661 words) - 18:03, 24 June 2025
  • language) – Java Platform, Enterprise Edition – Java Platform, Micro Edition – Java Platform, Standard Edition – Java API – JavaJava virtual machine (JVM)...
    17 KB (1,384 words) - 14:26, 28 February 2025
  • Thumbnail for Random number generation
    for use in cryptography. Random number generators have applications in gambling, statistical sampling, computer simulation, cryptography, completely...
    36 KB (4,424 words) - 00:46, 16 July 2025
  • Kyber (category Lattice-based cryptography)
    trapdoor function. It won the NIST competition for the first post-quantum cryptography (PQ) standard. NIST calls its standard, numbered FIPS 203, Module-Lattice-Based...
    15 KB (1,473 words) - 19:11, 24 July 2025
  • Java Platform, Micro Edition or Java ME is a computing platform for development and deployment of portable code for embedded and mobile devices (micro-controllers...
    19 KB (1,444 words) - 01:38, 28 June 2025
  • Java and C++ are two prominent object-oriented programming languages. By many language popularity metrics, the two languages have dominated object-oriented...
    67 KB (6,115 words) - 15:37, 2 July 2025
  • Galois/Counter Mode as well as misuse resistance in the event of the reuse of a cryptographic nonce. The construction is defined in RFC 8452. AES-GCM-SIV is designed...
    4 KB (398 words) - 12:58, 8 January 2025
  • Thumbnail for CUDA
    used to accelerate non-graphical applications in computational biology, cryptography and other fields by an order of magnitude or more. CUDA provides both...
    85 KB (4,327 words) - 12:10, 24 July 2025