Cryptographic utilities and security functions using Spring Security and BouncyCastle. Provides encryption/decryption, hashing, digital signatures, and secure random number generation.

LicenseLGPL 2.1
Tagsgithubsecuritycryptography
Organization Yan100 Dev Group
HomePage https://github.com/TrueNine/compose-server 🔍 Inspect URL
DateSep 30, 2025
Filespom (4 KB)  jar (86 KB)  View All
RepositoriesCentral
Ranking#77936 in MvnRepository (See Top Artifacts)
Used By6 artifacts

Note: There is a new version for this artifact

New Version0.0.46

Scope:
Scope:
Format:
Scope:
Scope:
Scope:
Scope:
Scope:
Scope:

Compile Dependencies (2)

Runtime Dependencies (4)

Licenses

LicenseURL
GNU Lesser General Public License v2.1 https://github.com/TrueNine/compose-server/blob/main/LICENSE

Developers

NameEmailDev IdRolesOrganization
赵日天truenine304520<at>gmail.comTrueNineDeveloper, FounderYan100 Dev Group
滕腾616057370<at>qq.comt_tengSponsor, FounderNanning, Guangxi, China Yan100 technology Ltd
Johana Ĉen845586878<at>qq.combambuoSponsorHubei, China Tianshu technology Ltd
1065700104<at>qq.commuyuSponsor

Related Books

Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition)Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025)
by Snoke, Nancy
Cryptography (The MIT Press Essential Knowledge series)Cryptography (The MIT Press Essential Knowledge series) (2024)
by Louridas, Panos
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern EncryptionSerious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption (2024)
by Aumasson, Jean-Philippe
Cryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum CryptographyCryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography (2024)
by Bertaccini, Massimo
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum AlgorithmsUnderstanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms (2024)
by Paar, Christof, Pelzl, Jan, Güneysu, Tim
Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition)Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024)
by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam
The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and MoreThe Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022)
by Tijms, Arjan, Bais, Teo, Keil, Werner
Real-World CryptographyReal-World Cryptography (2021)
by Wong, David
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital EncryptionThe Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption (2018)
by Holden, Joshua
Serious Cryptography: A Practical Introduction to Modern EncryptionSerious Cryptography: A Practical Introduction to Modern Encryption (2017)
by Aumasson, Jean-Philippe
Understanding Cryptography: A Textbook for Students and PractitionersUnderstanding Cryptography: A Textbook for Students and Practitioners (2014)
by Paar, Christof, Pelzl, Jan, Preneel, Bart
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics) (2014)
by Hoffstein, Jeffrey, Pipher, Jill, Silverman, Joseph H.
Break the Code: Cryptography for Beginners (Dover Kids Activity Books)Break the Code: Cryptography for Beginners (Dover Kids Activity Books) (2013)
by Johnson, Bud
Java Security (2nd Edition)Java Security (2nd Edition) (2001)
by Oaks, Scott
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum CryptographyThe Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (2000)
by Singh, Simon