
Bouncy Castle (cryptography) - Wikipedia
Bouncy Castle is a collection of APIs used for implementing cryptography in computer programs. It includes APIs for both the Java and the C# programming languages.
Comparison of cryptography libraries - Wikipedia
^ Bouncy Castle Specifications, bouncycastle.org, retrieved 2018-04-10 ^ cryptlib Encryption Toolkit, Peter Gutmann, retrieved 2015-11-28 ^ With Scute, scute.org ^ a b With GnuPG's …
Comparison of TLS implementations - Wikipedia
The Transport Layer Security (TLS) protocol provides the ability to secure communications across or inside networks. This comparison of TLS implementations compares several of the most …
AES implementations - Wikipedia
C# /.NET As of version 3.5 of the .NET Framework, the System.Security.Cryptography namespace contains both a fully managed implementation of AES and a managed wrapper …
Template:Latest stable software release/Bouncy Castle - Wikipedia
Template:Latest stable software release/Bouncy Castle < Template:Latest stable software release ... Back to article "Bouncy Castle (cryptography)"
Java Cryptography Architecture - Wikipedia
In computing, the Java Cryptography Architecture (JCA) is a framework for working with cryptography using the Java programming language. It forms part of the Java security API, …
Index of cryptography articles - Wikipedia
C2Net • C-36 (cipher machine) • C-52 (cipher machine) • Caesar cipher • Camellia (cipher) • CAPICOM • Capstone (cryptography) • Cardan grille • Card catalog (cryptology) • Carlisle …
Category:Cryptographic software - Wikipedia
B BBM Enterprise Bcrypt BestCrypt Bitfrost BitLocker Bitmessage Bitwarden BoringSSL Botan (programming library) Bouncy Castle (cryptography) BSAFE
Open Smart Card Development Platform - Wikipedia
Drivers are included for most ISO/IEC 7816 -4 compliant smart cards, PC/SC and CT-API card readers. The platform also provides cryptographic support through the Java Cryptography …
Category:Transport Layer Security implementation - Wikipedia
Pages in category "Transport Layer Security implementation" The following 19 pages are in this category, out of 19 total. This list may not reflect recent changes.