Cryptography
-
Core Java
Electronic Signature Using The WebCrypto API
Sometimes we need to let users sign something electronically. Often people understand that as placing your handwritten signature on the…
Read More » -
Software Development
Don’t just randomize, truly randomize!
The state of web application cryptography has changed, and each development language provides its own way of working with it.…
Read More » -
Core Java
Getting A List of Available Cryptographic Algorithms
How do you learn what cryptographic algorithms are available to you? The Java spec names several required ciphers, digests, etc.,…
Read More » -
Software Development
Cryptography & Theory 2: What is Pseudorandom
As was concluded in the first part of this series, security without randomness is impossible. Deterministic ciphers are unable to…
Read More » -
Software Development
This is Stuff: Cryptography & Theory 1: Meaning of Secure
Cryptography & Theory is series of blog posts on things I learned in coursera stanford online crypto class. The class contained…
Read More » -
Core Java
How to use ECC with OpenJDK
Everyone who ever tried to use Elliptic Curve Cryptography (ECC) in Java with an OpenJDK was either forced to use…
Read More » -
Core Java
Creating Password-Based Encryption Keys
This article discusses creating password-based encryption PBE keys. First a reminder of earlier points – as a rule you should,…
Read More » -
Core Java
Java Security Tutorial – Step by Step guide to create SSL connection and certificates
In our series of articles on applying JEE security we present you another detailed tutorial on how to create a…
Read More » -
Core Java
Cryptography Using JCA – Services In Providers
The Java Cryptography Architecture (JCA) is an extensible framework that enables you to use perform cryptographic operations. JCA also promotes…
Read More »
- 1
- 2