Poor Randomness: Securing Random Number Generation in Spring Applications Post date August 28, 2024 Post author By hackernoon Post categories In cryptographic-randomnes, cyber-security, cyber-security-awareness, java-cryptography, java-programming, spring-application-security, spring-boot-applications, spring-token-generation
Can Your Java Cryptography Architecture Survive a Quantum Attack? Post date June 27, 2024 Post author By Kunal Post categories In java-cryptography, jca-best-practices, key-management-in-java, quantum-attacks, quantum-computing-v-encryptio, quantum-resistant-cryptography, secure-encryption-algorithms, web-app-security