• The Web Cryptography API is the World Wide Web Consortium’s (W3C) recommendation for a low-level interface that would increase the security of web applications...
    9 KB (1,126 words) - 15:10, 21 April 2024
  • Thumbnail for Random password generator
    Random password generator (category Cryptographic algorithms)
    The Web Cryptography API is the World Wide Web Consortium’s (W3C) recommendation for a low-level interface that would increase the security of web applications...
    11 KB (1,260 words) - 03:43, 23 December 2024
  • an interface for authenticating users to web-based applications and services using public-key cryptography. WebAuthn credentials (which are themselves FIDO...
    28 KB (2,861 words) - 14:31, 21 December 2024
  • Thumbnail for Deno (software)
    a wide range of Web APIs. Restricts file system and network access by default in order to run sandboxed code. Supports a single API to utilize promises...
    29 KB (1,366 words) - 14:59, 15 December 2024
  • Thumbnail for HTML5
    Wide Web Consortium. "Web Audio API". World Wide Web Consortium. Retrieved 2 March 2018. MDN. "element.classList". "Web Cryptography API". w3.org. "WebRTC...
    61 KB (5,530 words) - 01:52, 1 December 2024
  • Thumbnail for Cryptography
    first cryptography chart – first cryptography chart World Wide Web Consortium's Web Cryptography API – World Wide Web Consortium cryptography standard...
    99 KB (10,939 words) - 03:34, 14 December 2024
  • than three web browsers. In July 2012 KCC announced a plan to promote the spread of HTML5 standards. As of 2018, W3C's Web Cryptography API has been used...
    22 KB (2,350 words) - 11:00, 17 September 2023
  • Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
    62 KB (6,486 words) - 11:44, 12 December 2024
  • Data Protection Application Programming Interface (DPAPI) is a simple cryptographic application programming interface available as a built-in component...
    8 KB (903 words) - 21:32, 20 November 2024
  • Key wrap (category Cryptographic algorithms)
    original on 3 June 2015. Retrieved 2 Jan 2021. "Key wrap algorithm". Retrieved 26 May 2016. "Web Cryptography API". www.w3.org. Retrieved 16 October 2019....
    6 KB (641 words) - 05:29, 16 September 2023
  • tables below compare cryptography libraries that deal with cryptography algorithms and have application programming interface (API) function calls to each...
    43 KB (1,526 words) - 20:52, 26 November 2024
  • implementation Scala implementation Common Lisp implementation (Ironclad) Web Cryptography API GNU GRUB to protect the bootloader password Wi-Fi Protected Access...
    10 KB (705 words) - 20:47, 16 July 2024
  • it suitable for use in cryptography. It is also referred to as a cryptographic random number generator (CRNG). Most cryptographic applications require random...
    29 KB (3,626 words) - 07:58, 21 December 2024
  • Internet Explorer 11 (category Windows web browsers)
    Screen and Orientation APIs, CSS border image support, JavaScript enhancements, DOM mutation observers, Web Cryptography API, video text track support...
    25 KB (1,966 words) - 20:23, 29 October 2024
  • Thumbnail for Channy Yun
    contributed Web standards such as HTML5 and Web cryptography API. He also founded WebStandards Korea as a member of the International Liaison Group of Web Standards...
    7 KB (627 words) - 07:44, 25 November 2023
  • Elliptic Curve Digital Signature Algorithm (category Public-key cryptography)
    In cryptography, the Elliptic Curve Digital Signature Algorithm (ECDSA) offers a variant of the Digital Signature Algorithm (DSA) which uses elliptic-curve...
    19 KB (2,833 words) - 15:10, 24 December 2024
  • public-key cryptography to interoperate with a WebAuthn client, that is, a conforming web user agent that implements the WebAuthn JavaScript API. The authenticator...
    30 KB (3,661 words) - 06:12, 22 December 2024
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
    48 KB (6,237 words) - 18:02, 5 December 2024
  • Transport Layer Security (category Cryptographic protocols)
    FIPS-validated cryptographic module BSAFE SSL-J: a TLS library providing both a proprietary API and JSSE API, using FIPS-validated cryptographic module cryptlib:...
    179 KB (17,624 words) - 03:37, 19 December 2024
  • In cryptography, PKCS (Public Key Cryptography Standards) are a group of public-key cryptography standards devised and published by RSA Security LLC,...
    10 KB (289 words) - 10:46, 24 June 2024
  • HMAC-SHA256. Typical cryptographic algorithms used are HMAC with SHA-256 (HS256) and RSA signature with SHA-256 (RS256). JWA (JSON Web Algorithms) RFC 7518...
    20 KB (1,557 words) - 03:27, 5 December 2024
  • Program Interface (GSS-API) Mechanism: Version 2 RFC 4537 Kerberos Cryptosystem Negotiation Extension RFC 4556 Public Key Cryptography for Initial Authentication...
    27 KB (3,022 words) - 14:07, 22 December 2024
  • ASP.NET (redirect from Web Forms)
    (codename "Roslyn") and is cross platform. ASP.NET MVC, ASP.NET Web API, and ASP.NET Web Pages (a platform using only Razor pages) have merged into a unified...
    17 KB (883 words) - 19:45, 20 November 2024
  • WebUSB is a JavaScript application programming interface (API) specification for securely providing access to USB devices from web applications. It was...
    19 KB (2,069 words) - 11:36, 18 December 2024
  • axTLS Microsoft CryptoAPI uses Cryptographic Service Providers to offer encryption implementations. The Microsoft AES Cryptographic Provider was introduced...
    12 KB (1,295 words) - 02:53, 21 December 2024
  • CryptGenRandom (category Cryptographic algorithms)
    CryptGenRandom is a deprecated cryptographically secure pseudorandom number generator function that is included in Microsoft CryptoAPI. In Win32 programs, Microsoft...
    17 KB (1,890 words) - 03:26, 24 December 2024
  • In cryptography, a shared secret is a piece of data, known only to the parties involved, in a secure communication. This usually refers to the key of a...
    2 KB (239 words) - 22:37, 3 December 2023
  • Top 10 - 2021, the ten most critical web application security risks include: Broken access control Cryptographic failures Injection Insecure design Security...
    10 KB (1,094 words) - 17:53, 24 November 2024
  • Thumbnail for Automatic Certificate Management Environment
    Automatic Certificate Management Environment (category Cryptographic protocols)
    not wildcards like *.example.com. Let's Encrypt turned off API v1 support on 1 June 2021. API v2 was released March 13, 2018 after being pushed back several...
    7 KB (645 words) - 20:48, 27 November 2024
  • Automated Threats to Web Applications". owasp.org. Archived from the original on June 29, 2024. Retrieved July 7, 2024. "OWASP API Security Project - OWASP...
    19 KB (1,628 words) - 21:19, 20 December 2024