-
hello,I want to know where to change Encryption Algorithm Negotiation List, because these are some Encryption Algorithms cant pass our testing which are not safe enough. So I want to know where to con…
-
Dear @Thalhammer
Thanks for this useful library and recent changes are wonderful, we can use the json library like simdjson or rapidjson for performance point of view
Since you develop this jwt…
-
The documentation currently refers to "curve25519" as an encryption algorithm, which is something it can't do.
Curve25519 is an ECDH curve which is used to generate an encryption key. Curve25519 is…
-
This issue tracks adding the PBE services to the OpenJCEPlus.
-
create en/decryption algorithms for audio, video and photo files
-
It should be possible to serve encryption subkeys with unknown algorithms - we don't need to process them since they can't make back-signatures and we don't currently use encryption for anything (this…
-
Use only standardized and extensively reviewed encryption algorithms.
*Measures*
```
None provided
```
*Metrics*
```
None provided
```
-
### Type
Content Issue
### Feedback
### Summary
The documentation for Decentralized Web Nodes (DWN) provides insightful details about their functionalities and specifications. However, there's a…
-
wkapi.js and fk.js
Both of these files are detected by Microsoft and KIMI with viruses. Trojan:Script/Wacatac.H! ml
It looks like you sent a bit of confused JavaScript code. This code contains a lot…
-
What algorithms for key exchange, encryption (and signing) do we use? How is crypto agility achieved?