finds you similar websites
auto-suggest    top sites

May 16th, 2024

14 Popular Sites Like Bouncycastle

Our team has explored the www and located several excellent java and security sites like Bouncycastle. Come and check out other websites that match Bouncycastle.

Displaying 11 to 20 of 500 alternatives to Bouncycastle. (Updated: May 16th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like Bouncycastle:
  bouncycastle.org
Home of open source libraries of the Legion of the Bouncy Castle and their Java cryptography and C# cryptography resources
http://www.bouncycastle.org/index.html
popularity:
java
security
cryptography
encryption
crypto
programming
api
opensource
library
development
new search by a custom tag signature
  JCaptcha - jcaptcha
An open source Java framework for captcha definition and site integration. Project information, documentation, issue tracker, and download.
similarity:
popularity:
java
captcha
security
opensource
library
programming
development
web
jcaptcha
tools
  Overview (Java 2 Platform SE 5.0)
This document is the API specification for the Java 2 Platform Standard Edition ... Provides the classes necessary to create an applet and the classes an ...
similarity:
popularity:
java
api
programming
reference
javadoc
documentation
development
j2se
docs
software
  Introduction
NaCl advances the state of the art by improving security, by improving usability, ... NaCl is part of the CACE (Computer Aided Cryptography Engineering) ...
similarity:
popularity:
security
cryptography
crypto
library
programming
encryption
software
network
free
opensource
  An Overview of Cryptography
Defines cryptographic terms and concepts, offers crypto scheme comparison, ... key, for example, can be found at http://www.garykessler.net/kumquat_pubkey.html. ...
similarity:
popularity:
cryptography
security
reference
encryption
crypto
algorithms
tutorial
computing
computer
programming
  An Illustrated Guide to Cryptographic Hashes
Steve Friedl's Unixwiz.net Tech Tips. An Illustrated Guide to Cryptographic Hashes ... With the recent news of weaknesses in some common security algorithms ...
similarity:
popularity:
security
cryptography
crypto
hash
encryption
reference
programming
tutorial
algorithms
md5
  Crypto++ Library 5.5.2 - a Free C++ Class Library of Cryptographic Schemes
free C++ library for cryptography: includes ciphers, message authentication codes, one-way hash functions, public-key ... cryptopp-users@googlegroups.com ...
similarity:
popularity:
c++
cryptography
library
programming
security
development
opensource
free
crypto
encryption
  JScience
The most comprehensive Java library for the scientific community. ... Real-Time Behavior and Compliance: JScience can safely be used with RTSJ VMs ...
similarity:
popularity:
java
science
library
math
programming
opensource
api
development
software
framework
  Programming With the Java XML Digital Signature API
No information avaiable
similarity:
popularity:
java
xml
security
signature
cryptography
programming
tutorial
development
api
howto
  A Lesson In Timing Attacks (or, Don't use MessageDigest.isEquals) | codahale.com
No information avaiable
similarity:
popularity:
security
cryptography
java
timing
programming
hacking
attack
crypto
statistics
python
  JFreeChart
The official home page of the JFreeChart project. ... a flexible design that is easy to extend, and targets both server-side and client-side applications; ...
similarity:
popularity:
java
chart
opensource
programming
charts
library
graphics
visualization
development
software
< prev ... 1 2 3 4 5 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.