Bouncy Castle

Known as: Bouncycastle, Legion of the Bouncy Castle Inc. 
Bouncy Castle is a collection of APIs used in cryptography. It includes APIs for both the Java and the C# programming languages. The APIs are… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2003-2016
02420032016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
In this paper, we study the side-channel resistance of the implementation of the ECDSA signature scheme in Android’s standard… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2015
2015
Information Security has become an important element of data communication. Various encryption algorithms have been proposed and… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2014
2014
Station notation one (aSn.1) is a standard that provides a set of notations for encoding/decoding and transmitting data over… (More)
Is this relevant?
2012
2012
Secure two-party and multiparty computation has long stood at the center of the foundations of theoretical cryptography. Recently… (More)
  • figure 1
  • table 1
Is this relevant?
2011
2011
Mobile Computing devices are increasing enormously in all fields of communication, which aims to focus on secure transfer of… (More)
  • figure 1
  • figure 4
  • figure 3
  • figure 5
  • table I
Is this relevant?
2008
2008
BouncyCastle is an open source Crypto provider written in Java which supplies classes for Elliptic Curve Cryptography (ECC). We… (More)
Is this relevant?
2008
2008
This paper describes an automatic method for proving equivalence of implementations of block ciphers (and similar cryptographic… (More)
Is this relevant?
2007
2007
With a rapid growth in computer networks, many people can access the network through the Internet and therefore an electronic… (More)
  • figure 1
Is this relevant?
2006
2006
The following article presents the design concepts behind a stand-alone grade management system. The system uses digital… (More)
  • figure 1
  • figure 2
Is this relevant?
2004
2004
This paper describes a design approach to include and optimize Java based cryptographic applications into resource limited… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 4
Is this relevant?