/libcore/luni/src/main/java/javax/crypto/spec/ |
package.html | 9 <li>PKCS#5 Password-Based Cryptography standard.
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/generators/ |
DHParametersHelper.java | 49 // Handbook of Applied Cryptography 4.86 58 // RFC 2631 2.1.1 (and see Handbook of Applied Cryptography 4.81)
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_pkcs.h | 3 /* ===> PKCS #1 -- RSA Cryptography <=== */ 70 /* ===> PKCS #5 -- Password Based Cryptography <=== */
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/digests/ |
GeneralDigest.java | 7 * "Handbook of Applied Cryptography", pages 344 - 347.
|
SHA1Digest.java | 6 * implementation of SHA-1 as outlined in "Handbook of Applied Cryptography", pages 346 - 349.
|
MD5Digest.java | 5 * implementation of MD5 as outlined in "Handbook of Applied Cryptography", pages 346 - 347.
|
/external/chromium/net/third_party/nss/ssl/bodge/ |
ec.h | 15 * The Original Code is the Elliptic Curve Cryptography library.
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/macs/ |
CBCBlockCipherMac.java | 59 * the chance of an exhaustive attack (see Handbook of Applied Cryptography). 79 * the chance of an exhaustive attack (see Handbook of Applied Cryptography).
|
CMac.java | 64 * the chance of an exhaustive attack (see Handbook of Applied Cryptography).
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/signers/ |
DSASigner.java | 16 * Cryptography", pages 452 - 453.
|
/external/dropbear/libtomcrypt/notes/ |
tech0002.txt | 18 learn the key used. However, good cryptography mandates the close scrutiny of any practical side channel.
|
/external/webkit/SunSpider/hosted/ |
sunspider.html | 51 input, a 3D raytracer, cryptography tests, code decompression, and
|
/libcore/luni/src/main/java/java/security/spec/ |
ECParameterSpec.java | 23 * The parameter specification used with Elliptic Curve Cryptography (ECC).
|
/libcore/luni/src/main/java/org/apache/harmony/security/provider/crypto/ |
CryptoProvider.java | 29 * JavaTM Cryptography Architecture, API Specification & Reference
|
/external/libvpx/examples/includes/geshi/geshi/ |
csharp.php | 136 'System.Security.Cryptography', 137 'System.Security.Cryptography.X509Certificates',
|
/external/dropbear/ |
rsa.c | 28 * The format is specified in rfc2437, Applied Cryptography or The Handbook of 29 * Applied Cryptography detail the general algorithm. */
|
dss.c | 37 * See FIPS186 or the Handbook of Applied Cryptography for details of the
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/params/ |
DESParameters.java | 56 * Cryptography"</a> by Bruce Schneier for more information.
|
/libcore/luni/src/main/java/java/security/ |
security.properties | 22 # See also: J2SE doc. "How to Implement a Provider for the JavaTM Cryptography Architecture"
|
/libcore/luni/src/test/java/libcore/java/security/ |
ProviderTest.java | 124 * How to Implement a Provider in the Java ™ Cryptography Architecture
|
/libcore/luni/src/test/java/libcore/javax/crypto/ |
SecretKeyFactoryTest.java | 33 * information, see http://en.wikipedia.org/wiki/Salt_(cryptography)
|
/libcore/support/src/test/java/libcore/java/security/ |
StandardNames.java | 40 * Java ™ Cryptography Architecture Sun Providers Documentation 45 * Java ™ Cryptography Architecture Standard Algorithm Name Documentation
|
/bionic/libc/bionic/ |
arc4random.c | 23 * This code is derived from section 17.1 of Applied Cryptography,
|
/external/e2fsprogs/lib/ext2fs/ |
dirhash.c | 25 * (see Applied Cryptography, 2nd edition, p448).
|
/external/kernel-headers/original/asm-x86/ |
cpufeature_32.h | 102 #define X86_FEATURE_ACE2 (5*32+ 8) /* Advanced Cryptography Engine v2 */
|