About 1,773,176 results (4,510 milliseconds)

Encrypting Files in Local Storage

https://groups.google.com/g/codenameone-discussions/c/A70MLXVJS70
Other examples use BouncyCastle classes but still include packages that are not available in CodenameOne projects. The following two links have encryption and ...

Bouncy Castle generate public key from Modulus and Exponent

https://groups.google.com/g/codenameone-discussions/c/VnNM5esLtSM
Feb 11, 2015 ... Thanks for example. So I would have to change the encryption of the system from RSA to AES is what I am understanding. Thats fine and I can ...

Using BouncyCastle (or other encryption providers) in DW?

https://groups.google.com/g/dropwizard-user/c/Grp5atjNSTU
Sep 19, 2013 ... How can one use the BouncyCastle encryption library (or another external JCE provider) in a DW app? Is there an example somewhere? This is ...

Encrypt with JCE (AES/CBC/PKCS5Padding), decrypt with crypto++ ...

https://groups.google.com/g/cryptopp-users/c/1peWtMR1jgU
... bouncy castle*/ cipher.init(Cipher.ENCRYPT_MODE, skeySpec);. Something else ... make sure that the file is base64 encoded, java and c are using different ...

Failed to instantiate Cipher object. Transformation RSA/NONE ...

https://groups.google.com/g/sybase.public.jconnect/c/FD0XHvdVV6I
3) Edit the list of security providers for this instance of Java. Add Bouncy Castle to %SYBASE%\Shared\JRE-6_0_6_32BIT\lib\security\java.security. For example:

Can't navigate to gerrit site with reverse proxy and ssl

https://groups.google.com/g/repo-discuss/c/mqHPpmLGucE
... example.com) in the browser and told me those messages that is "404 Not Found ... Gerrit Code Review is not shipped with Bouncy Castle Crypto v144. If ...

[dev preview] javax.crypto.IllegalBlockSizeException when ...

https://issuetracker.google.com/issues/36708951
Create RSA 2048bit keypair, Encryption Padding = ENCRYPTION_PADDING_RSA_OAEP, Digest = DIGEST_SHA256, User Authentication = false, Encrypt 48 bytes inputdata.

BER decode error on loading EC private key.

https://groups.google.com/g/cryptopp-users/c/FFKGRtZJp_k
According to Bouncy Castle compatability patch and java example as I understand I need to instantiate: ... This will probably be specified in the Encryption ...

Crypro++ ECIES compatybility with openSSL

https://groups.google.com/g/cryptopp-users/c/v5r3gofcnoM
Apr 15, 2015 ... But Crypto++ and Bouncy Castle produce different results (use ECIES_BC in Crypto ... You can also test with Certicom's SecurityBuilder or RSA ...

Titan Security Key | Google Cloud

https://cloud.google.com/security/products/titan-security-key
Security keys use public key cryptography to verify a user's identity and ... Titan Security Keys are available in two form factors: USB-A/NFC and USB-C/NFC.

lbathen - bouncy_castle

https://sites.google.com/site/lbathen/research/bouncy_castle
The Bouncy Castle Crypto API for Java provides a lightweight cryptography API that works with everything from the J2ME to the JDK 1.6 platform and also a ...

JBoss DevStudio 9 and EclEmma

https://groups.google.com/g/jacoco/c/Eddb6Cx6kXQ/m/LWWzMJMhAgAJ
java.ext.dirs=C:\Program Files\Java\jre1.8.0_66\lib\ext;C:\Windows\Sun ... Bouncy Castle Provider" [Starting] org.eclipse.ant.core (3.4.0.v20150428 ...

OpenSSL::Cipher decrypt returns 'wrong final block length'

https://groups.google.com/g/rubyonrails-talk/c/-zwq8J_9t4o
Feb 26, 2009 ... We are using Bouncy Castle CTS AES encrypt. The openSSL appears to be using CBC. I'm no expert... In looking at the RFC, it appears there is ...

Jarvis Operated Printer Farms

https://groups.google.com/g/3dprintertipstricksreviews/c/6EmNvV8sMNo/m/nPmMKp7s-msJ
Security: 4kbit RSA encryption. Warranty. Full protection plan for the duration of the Printer Farm Contract. 4-6 week lead time. Price $3,499 - 12"x12" Jarvis ...

EP2557521A2 - Reprogrammable security for controlling piracy and ...

https://patents.google.com/patent/EP2557521A2/en
For example, an exemplary bulk decryption "trap" operation utilizes the AES encryption ... For example, step (c) may reject modifications that are too ...

(Pre-)Intent to Deprecate: <keygen> element and application/x-x509 ...

https://groups.google.com/a/chromium.org/g/blink-dev/c/pX5NbX0Xack/m/JN-v2FEmBgAJ
... RSA Signature Algorithm") of RFC 3279, and defined in RFC 3447. [RFC3279] ... [1] As one can see from the bouncy castle API http://www.bouncycastle.org ...

FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7 ...

https://cloud.google.com/blog/topics/threat-intelligence/evolution-of-fin7
Apr 4, 2022 ... For example, the first command line pattern has been seen over ... T1573.002: Asymmetric Cryptography. Discovery. T1012: Query Registry ...

EP0534420A2 - A method for generating public and private key ...

https://patents.google.com/patent/EP0534420A2/en
... encryption and decryption. For example, in the RSA algorithm both encryption and decryption are performed as exponentiation modulo a composite number.

US5200999A - Public key cryptosystem key management based on ...

https://patents.google.com/patent/US5200999A/en
For example, consider the method of encrypting K with a variant key KK+C to produce eKK+C(K). In this case, K is encrypted using the Data Encryption Algorithm, ...

US9177157B2 - System and method for routing-based internet ...

https://patents.google.com/patent/US9177157B2/en
One non-limiting example is the exchange of public-key in the RSA algorithm or any other public-key based cryptography. Such prior communication enhances the ...