The AWS Java SDK for AWS KMS module holds the client classes that are used for communicating with AWS Key Management Service

LicenseApache 2.0
CategoriesEncryption Libraries
Tagsawsamazonsecuritysdkcryptoencryption
HomePage https://aws.amazon.com/sdkforjava 🔍 Inspect URL
Ranking#7142 in MvnRepository (See Top Artifacts)
#19 in Encryption Libraries
Used By73 artifacts

VersionVulnerabilitiesRepositoryUsagesDate
2.38.x
2.38.7CentralNov 15, 2025
2.38.6CentralNov 14, 2025
2.38.5CentralNov 13, 2025
2.38.4CentralNov 12, 2025
2.38.3CentralNov 11, 2025
2.38.2CentralNov 07, 2025
2.38.1CentralNov 06, 2025
2.38.0CentralNov 06, 2025
2.37.x
2.37.5CentralNov 05, 2025
2.37.4CentralNov 04, 2025
2.37.3CentralNov 01, 2025
2.37.2CentralOct 31, 2025
2.37.1CentralOct 30, 2025
2.37.0CentralOct 29, 2025
2.36.x
2.36.3CentralOct 28, 2025
2.36.2CentralOct 24, 2025
2.36.1CentralOct 23, 2025
2.36.0CentralOct 23, 2025
2.35.x
2.35.11CentralOct 21, 2025
2.35.10CentralOct 17, 2025

Related Books

System Design on AWS: Building and Scaling Enterprise SolutionsSystem Design on AWS: Building and Scaling Enterprise Solutions (2025)
by Kumar, Jayanth, Singh, Mandeep
Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition)Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025)
by Snoke, Nancy
Engineering Resilient Systems on AWS: Design, Build, and Test for ResilienceEngineering Resilient Systems on AWS: Design, Build, and Test for Resilience (2024)
by Schwarz, Kevin, Moran, Jennifer, Bachmeier, Nate
Cryptography (The MIT Press Essential Knowledge series)Cryptography (The MIT Press Essential Knowledge series) (2024)
by Louridas, Panos
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern EncryptionSerious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption (2024)
by Aumasson, Jean-Philippe
Java Microservices and Containers in the Cloud: With Spring Boot, Kafka, PostgreSQL, Kubernetes, Helm, Terraform and AWS EKSJava Microservices and Containers in the Cloud: With Spring Boot, Kafka, PostgreSQL, Kubernetes, Helm, Terraform and AWS EKS (2024)
by Christudas, Binildas A.
Cryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum CryptographyCryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography (2024)
by Bertaccini, Massimo
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum AlgorithmsUnderstanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms (2024)
by Paar, Christof, Pelzl, Jan, Güneysu, Tim
Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition)Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024)
by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam
Building and Delivering Microservices on AWS: Master software architecture patterns to develop and deliver microservices to AWS CloudBuilding and Delivering Microservices on AWS: Master software architecture patterns to develop and deliver microservices to AWS Cloud (2023)
by Singh, Amar Deep, Carpenter, Jeff
Amazon Web Services in Action, Third Edition: An in-depth guide to AWSAmazon Web Services in Action, Third Edition: An in-depth guide to AWS (2023)
by Wittig, Andreas, Wittig, Michael
The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and MoreThe Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022)
by Tijms, Arjan, Bais, Teo, Keil, Werner
AWS Cookbook: Recipes for Success on AWSAWS Cookbook: Recipes for Success on AWS (2022)
by Culkin, John, Zazon, Mike
Real-World CryptographyReal-World Cryptography (2021)
by Wong, David
Data Science on AWS: Implementing End-to-End, Continuous AI and Machine Learning PipelinesData Science on AWS: Implementing End-to-End, Continuous AI and Machine Learning Pipelines (2021)
by Fregly, Chris, Barth, Antje
Programming AWS Lambda: Build and Deploy Serverless Applications with JavaProgramming AWS Lambda: Build and Deploy Serverless Applications with Java (2020)
by Chapin, John, Roberts, Mike
Learning Amazon Web Services (AWS): A Hands-On Guide to the Fundamentals of AWS CloudLearning Amazon Web Services (AWS): A Hands-On Guide to the Fundamentals of AWS Cloud (2019)
by Wilkins, Mark
Serverless Programming Cookbook: Practical solutions to building serverless applications using Java and AWSServerless Programming Cookbook: Practical solutions to building serverless applications using Java and AWS (2019)
by Kanikathottu, Heartin
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital EncryptionThe Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption (2018)
by Holden, Joshua
Serious Cryptography: A Practical Introduction to Modern EncryptionSerious Cryptography: A Practical Introduction to Modern Encryption (2017)
by Aumasson, Jean-Philippe
Practical Amazon EC2, SQS, Kinesis, and S3: A Hands-On Approach to AWSPractical Amazon EC2, SQS, Kinesis, and S3: A Hands-On Approach to AWS (2017)
by Gulabani, Sunil
Understanding Cryptography: A Textbook for Students and PractitionersUnderstanding Cryptography: A Textbook for Students and Practitioners (2014)
by Paar, Christof, Pelzl, Jan, Preneel, Bart
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics) (2014)
by Hoffstein, Jeffrey, Pipher, Jill, Silverman, Joseph H.
Break the Code: Cryptography for Beginners (Dover Kids Activity Books)Break the Code: Cryptography for Beginners (Dover Kids Activity Books) (2013)
by Johnson, Bud
Java Security (2nd Edition)Java Security (2nd Edition) (2001)
by Oaks, Scott
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum CryptographyThe Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (2000)
by Singh, Simon