About 113 results
Open links in new tab
  1. Bouncy Castle (cryptography) - Wikipedia

    Bouncy Castle is a collection of APIs used for implementing cryptography in computer programs. It includes APIs for both the Java and the C# programming languages.

  2. Template:Latest stable software release/Bouncy Castle - Wikipedia

    ^ "Download Bouncy Castle for Java - bouncycastle.org". 2025-11-27. Retrieved 2025-12-01. ^ "Download Bouncy Castle for Java LTS - bouncycastle.org". 2025-09-19. Retrieved 2025-12 …

  3. Comparison of cryptography libraries - Wikipedia

    Comparison of cryptography libraries The tables below compare cryptography libraries that deal with cryptography algorithms and have application programming interface (API) function calls …

  4. Microsoft CryptoAPI - Wikipedia

    The Microsoft Windows platform specific Cryptographic Application Programming Interface (also known variously as CryptoAPI, Microsoft Cryptography API, MS-CAPI or simply CAPI) is an …

  5. Comparison of TLS implementations - Wikipedia

    The Transport Layer Security (TLS) protocol provides the ability to secure communications across or inside networks. This comparison of TLS implementations compares several of the most …

  6. Category:Cryptographic software - Wikipedia

    Pages in category "Cryptographic software" The following 176 pages are in this category, out of 176 total. This list may not reflect recent changes.

  7. EAX mode - Wikipedia

    EAX mode (encrypt-then-authenticate-then-translate [1]) is a mode of operation for cryptographic block ciphers. It is an Authenticated Encryption with Associated Data (AEAD) algorithm …

  8. Talk:Bouncy Castle (cryptography) - Wikipedia

    This article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project …

  9. Crypto++ - Wikipedia

    Crypto++ ordinarily provides complete cryptographic implementations and often includes less popular, less frequently-used schemes. For example, Camellia is an ISO / NESSIE / IETF …

  10. FIPS 140-2 - Wikipedia

    Rngtest result of a randomness test using FIPS 140-2 The National Institute of Standards and Technology (NIST) issued the FIPS 140 Publication Series to coordinate the requirements and …