Location:
Search - bouncy castle
Search list
Description: XML Signature application, that support detach and enveloped signature. Using bouncy castle component to create X509 certificate as the private key of the system.
Platform: |
Size: 1698816 |
Author: Okki |
Hits:
Description: While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how.
This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.-While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how.
This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.
Platform: |
Size: 2560000 |
Author: YY |
Hits:
Description: While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how.
This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.-While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how.
This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.
Platform: |
Size: 2560000 |
Author: bk |
Hits:
Description: Bouncy Castle Test is a demo program for Bouncy Castle encryption and decryption-Bouncy Castle Test
Platform: |
Size: 10240 |
Author: 李波 |
Hits:
Description: Bouncy Castle Test is a demo program for Bouncy Castle encryption and decryption-Bouncy Castle Test
Platform: |
Size: 13312 |
Author: 李波 |
Hits:
Description: PHP实现RSA算法/*
* Implementation of the RSA algorithm
* (C) Copyright 2004 Edsko de Vries, Ireland
*
* Licensed under the GNU Public License (GPL)
*
* This implementation has been verified against [3]
* (tested Java/PHP interoperability).
*
* References:
* [1] "Applied Cryptography", Bruce Schneier, John Wiley & Sons, 1996
* [2] "Prime Number Hide-and-Seek", Brian Raiter, Muppetlabs (online)
* [3] "The Bouncy Castle Crypto Package", Legion of the Bouncy Castle,
* (open source cryptography library for Java, online)
* [4] "PKCS #1: RSA Encryption Standard", RSA Laboratories Technical Note,
* version 1.5, revised November 1, 1993
*/
-/*
* Implementation of the RSA algorithm
* (C) Copyright 2004 Edsko de Vries, Ireland
*
* Licensed under the GNU Public License (GPL)
*
* This implementation has been verified against [3]
* (tested Java/PHP interoperability).
*
* References:
* [1] "Applied Cryptography", Bruce Schneier, John Wiley & Sons, 1996
* [2] "Prime Number Hide-and-Seek", Brian Raiter, Muppetlabs (online)
* [3] "The Bouncy Castle Crypto Package", Legion of the Bouncy Castle,
* (open source cryptography library for Java, online)
* [4] "PKCS#1: RSA Encryption Standard", RSA Laboratories Technical Note,
* version 1.5, revised November 1, 1993
*/
Platform: |
Size: 6144 |
Author: gg |
Hits:
Description: Rsa of 1024 bits on j2me platform using the bouncy castle apis for support for java.math.BigInteger and java.scrurity.SecureRandom and with highest obfuscation in Netbeans6.5 with CLDC1.1 and MIDP 2.1
Platform: |
Size: 1024 |
Author: Lok |
Hits:
Description: ElGamal source code with bouncy castle library
Platform: |
Size: 2048 |
Author: tque |
Hits:
Description: 使用bouncy castle 的jar包实现的ElGamal加密模块,以及测试用例,需要导入bouncy castle包(内附),并且你需要在JDK的JRE环境中,或者是JRE环境中配置上local_policy.jar和US_export_policy.jar(压缩包内已有jdk6和7的)。
切换到 JDK_Home \jre\lib\security目录下,对应覆盖local_policy.jar和US_export_policy.jar两个文件。同时,你可能有必要在 JRE_Home \lib\security目录下,也需要对应覆盖这两个文件。
配置权限文件的最终目的是为了使应用在运行环境中获得相应的权限,可以加强应用的安全性。
通常,我们在应用服务器上安装的是JRE,而不是JDK。因此,这就很有必要在应用服务器的 JRE_Home \lib\security目录下,对应覆盖这两个权限文件。-Use bouncy castle jar package implements the ElGamal encryption module, as well as the test case, you need to import a bouncy castle pack (included), and you need the JDK JRE environment, or the JRE the configuration on local_policy.jar and US_export_policy.jar (compression packages of existing jdk6 and 7). Switch to JDK_Home \ jre \ lib \ security directory, the corresponding coverage local_policy.jar, and US_export_policy.jar two files. At the same time, you may need in the JRE_Home \ lib \ security directory also needs corresponding to the coverage of these two documents. Configuration permissions files ultimate goal is to make application to obtain the appropriate permissions in the operating environment, can strengthen the security of the application. Typically, it is installed on the application server JRE, instead of JDK. This is necessary in the application server JRE_Home \ lib \ security directory corresponding to the coverage of these two permissions file.
Platform: |
Size: 2014208 |
Author: 张起 |
Hits:
Description: Bouncy Castle Provider Source Code for Andriod.
Platform: |
Size: 8192 |
Author: tibunwiu |
Hits:
Description: Bouncy Castle Provider Source Code for Linux v2.13.6.
Platform: |
Size: 8192 |
Author: fonherziu |
Hits:
Description: Bouncy Castle Provider Source Code for Andriod.
Platform: |
Size: 8192 |
Author: sgrabnrlroc |
Hits:
Description: Bouncy Castle for chryptografy options whith crtificates
Platform: |
Size: 3460096 |
Author: Pablo S??nchez |
Hits: