Chapter 20. The J2ME Crypto Recipes
CHAPTER OVERVIEW
Symmetric Encryption
Password-Based Encryption
Public Key Encryption
Digital Signature
The Bouncy Castle API
The IAIK JCE ME API
The Phaos Micro Foundation API
NTRU jNeo API
In the previous chapter, we reviewed leading cryptography libraries for J2ME. In this chapter, we use code examples to show how to perform various common cryptographic tasks using those libraries.
Overview of Recipes
The sample applications in this chapter provide ready-to-use code snippets for symmetric key encryption, password-based encryption, public key encryption, and digital signature tasks. You can use them in your custom J2ME applications. Brief descriptions of those common tasks are given in Table 20.1. For detailed discussions ...
Get Enterprise J2ME™: Developing Mobile Java™ Applications now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.