• The Java Cryptography Extension (JCE) is an officially released Standard Extension to the Java Platform and part of Java Cryptography Architecture (JCA)...
    2 KB (145 words) - 18:55, 5 November 2024
  • [citation needed] Java Cryptography Extension Bouncy Castle (cryptography) Official JCA guides: JavaSE6, JavaSE7, JavaSE8, JavaSE9, JavaSE10, JavaSE11 v t e v...
    2 KB (107 words) - 17:08, 30 December 2023
  • collection of APIs used for implementing cryptography in computer programs. It includes APIs for both the Java and the C# programming languages. The APIs...
    9 KB (1,079 words) - 22:38, 29 August 2024
  • Jordanhill College of Education In computing: JWPce file extension Java Cryptography Extension defines APIs for several encryption mechanisms Joomla Content...
    842 bytes (124 words) - 23:11, 30 August 2024
  • the Java Runtime Environment, SPIs are used in: Java Database Connectivity Java Cryptography Extension Java Naming and Directory Interface Java API for...
    3 KB (332 words) - 06:35, 21 February 2023
  • jksExportKey, CERTivity, Portecle and KeyStore Explorer. Java Secure Socket Extension Keyring (cryptography) Public key infrastructure The keytool Command - a...
    2 KB (163 words) - 21:30, 19 February 2024
  • various other cryptographic algorithms The crypto/aes package in standard library Java Cryptography Extension, integrated in the Java Runtime Environment...
    12 KB (1,295 words) - 05:00, 19 May 2025
  • JSR 5 and JSR 63) Integrated security and cryptography extensions (JCE, JSSE, JAAS) Java Web Start included (Java Web Start was first released in March 2001...
    203 KB (11,109 words) - 05:25, 18 June 2025
  • IAIK-JCE (category Cryptographic software)
    purposes, evaluation and open-source development. Java Cryptography Architecture Java Cryptography Extension Official website "Newest Releases". 2021-12-24...
    2 KB (124 words) - 12:46, 5 July 2024
  • it suitable for use in cryptography. It is also referred to as a cryptographic random number generator (CRNG). Most cryptographic applications require random...
    29 KB (3,633 words) - 08:24, 16 April 2025
  • "Announcing Java Card 3.2 Release". Java Card Blog. Retrieved 6 February 2023. Ponsini, Nicolas. "Unveiling Java Card 3.1: New Cryptographic Extensions". blogs...
    16 KB (2,066 words) - 01:59, 25 May 2025
  • License is in use by the Cryptix project, well known for their Java Cryptography Extension. It is a modified version of the BSD license, with similarly...
    1 KB (82 words) - 23:18, 4 April 2022
  • (formerly Java XML) for Remote Procedure Calls JAXP—Java API for XML Processing JBOD—Just a Bunch of Disks JCE— Java Cryptography Extension JCL—Job Control...
    92 KB (6,595 words) - 12:30, 13 June 2025
  • Comparison of TLS implementations (category Cryptographic software)
    1.11.15, 2015-03-08 — Botan". 2015-03-08. Retrieved 2015-03-11. "Java Cryptography Architecture Oracle Providers Documentation". docs.oracle.com. "NSS...
    135 KB (4,833 words) - 13:14, 18 March 2025
  • Open Smart Card Development Platform (category Free software programmed in Java (programming language))
    CT-API card readers. The platform also provides cryptographic support through the Java Cryptography Extension (JCE) with the Bouncy Castle Crypto API. The...
    2 KB (159 words) - 01:50, 12 February 2025
  • Managed Extensions for C++ or Managed C++ is a deprecated set of language extensions for C++, including grammatical and syntactic extensions, keywords...
    16 KB (2,127 words) - 23:12, 12 December 2023
  • SmartMX controller (SMX) JCOP v2.2 GlobalPlatform 2.1.1 Java Card 2.2.1 Elliptic Curve Cryptography (ECC) F2M support JCOP Tools Eclipse based JCOP v2.2...
    9 KB (1,033 words) - 01:46, 12 February 2025
  • BSAFE (category Cryptographic software)
    formerly known as RSA BSAFE, is a FIPS 140-2 validated cryptography library, available in both C and Java. BSAFE was initially created by RSA Security, which...
    17 KB (1,712 words) - 15:27, 13 February 2025
  • In computer science and cryptography, Whirlpool (sometimes styled WHIRLPOOL) is a cryptographic hash function. It was designed by Vincent Rijmen (co-creator...
    11 KB (1,054 words) - 03:57, 19 March 2024
  • PKCS 12 (category Cryptography standards)
    family of standards called Public-Key Cryptography Standards (PKCS) published by RSA Laboratories. The filename extension for PKCS #12 files is .p12 or .pfx...
    9 KB (746 words) - 10:15, 20 December 2024
  • Connected Device Configuration (category Java device platform)
    Authorization Service (JAAS), Java Secure Socket Extension (JSSE), and Java Cryptography Extension (JCE). The Personal Basis Profile provides a superset...
    7 KB (786 words) - 19:06, 15 January 2025
  • Thumbnail for Java (software platform)
    between C and Java. Unsigned large numbers are also used in many numeric processing fields, including cryptography, which can make Java less convenient...
    77 KB (8,479 words) - 18:40, 31 May 2025
  • NaCl (software) (category Cryptographic software)
    NaCl (Networking and Cryptography Library, pronounced "salt") is a public domain, high-speed software library for cryptography. NaCl was created by the...
    10 KB (745 words) - 14:06, 24 May 2025
  • PKCS 7 (category Cryptography standards)
    In cryptography, PKCS #7 ("PKCS #7: Cryptographic Message Syntax", "CMS") is a standard syntax for storing signed and/or encrypted data. PKCS #7 is one...
    4 KB (443 words) - 12:38, 16 June 2024
  • Thumbnail for HMAC
    In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific...
    18 KB (2,316 words) - 18:51, 16 April 2025
  • recommendation for a Web Cryptography API that could perform basic cryptographic operations in web applications. This agnostic API would utilize JavaScript to perform...
    9 KB (1,126 words) - 21:39, 4 April 2025
  • Thumbnail for Merkle tree
    Merkle tree (category Cryptographic hash functions)
    In cryptography and computer science, a hash tree or Merkle tree is a tree in which every "leaf" node is labelled with the cryptographic hash of a data...
    15 KB (1,822 words) - 16:33, 18 June 2025
  • reverse-engineering the code is cryptographically hard. This is formalized in the many proposals for indistinguishability obfuscation, a cryptographic primitive that,...
    18 KB (1,668 words) - 18:48, 29 May 2025
  • Transport Layer Security (category Cryptographic protocols)
    Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network, such as the Internet....
    178 KB (17,519 words) - 23:52, 19 June 2025
  • PBKDF2 (category Cryptography standards)
    In cryptography, PBKDF1 and PBKDF2 (Password-Based Key Derivation Function 1 and 2) are key derivation functions with a sliding computational cost, used...
    13 KB (1,337 words) - 12:18, 2 June 2025