LoRaWANTM is a Low Power Wide Area Network (LPWAN) pro- tocol that supports low-cost, mobile, and secure bi-directional communication for Internet of Things (IoT), machine-to-machine (M2M), smart city, and industrial applications. The LoRaWAN protoc
HMAC-Keyed-Hashing for Message Authentication,This document describes HMAC, a mechanism for message authentication using cryptographic hash functions.RFC 2104
Conscrypt - A Java Security Provider Conscrypt is a Java Security Provider (JSP) that implements parts of the Java Cryptography Extension (JCE) and Java Secure Socket Extension (JSSE). It uses BoringSSL to provide cryptographic primitives and Transp
Secure Device Storage - Android Storing Credentials Securely on Android Devices Introduction Storing credentials securely on a device is in many occasions necessary. You probably dont want to rely only on the separation of processes of the Android
The Bouncy Castle Crypto Package For Java The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms, it was developed by the Legion of the Bouncy Castle, a registered Australian Charity, with a little help! The Legion, an
Android SuperGenPass utility This is an Android implementation of [SuperGenPass](http://supergenpass.com/). SuperGenPass is a different kind of password manager: instead of randomly-generating and storing passwords, it combines a Web sites domain a
Preface In today’s world, where computer viruses and security threats are common themes in anything from Hollywood movies and TV advertisements to political discussions, it seems unthinkable to ignore security considerations in the design and implem
The TPM, a secure cryptographic integrated circuit (IC), provides a hardware-based approach to manage user authentication, network access, data protection and more that takes security to higher level than software-based security. Perhaps surprisingl
ARMv8 架构手册 Part A ARMv8 Architecture Introduction and Overview Chapter A1 Introduction to the ARMv8 Architecture A1.1 About the ARM architecture ................................................................................. A1-30 A1.2 Architectur
Bloom filters are probabilistic data structures which permit to conve- niently represent set membership. Their performance/memory efficiency makes them appealing in a huge variety of scenarios. Their probabilistic operation, along with the implicit
最新版的JAVA加密算法包。
The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.8.