crypto

CategoriesEncryption Libraries
Tagscryptographyencryptionsecuritycrypto
Organization uk.gov.hmrc
HomePage https://github.com/hmrc/crypto 🔍 Inspect URL
DateJul 30, 2025
Filespom (3 KB)  jar (189 KB)  View All
RepositoriesUkGov
Ranking#7987 in MvnRepository (See Top Artifacts)
#21 in Encryption Libraries
Used By65 artifacts
Scala TargetScala 3 (View all targets)

Note: There is a new version for this artifact

New Version8.4.0

Scope:
Scope:
Format:
Scope:
Scope:
Scope:
Scope:
Scope:
Scope:

Note: this artifact is located at UkGov repository (https://open.artefacts.tax.service.gov.uk/maven2/)

Compile Dependencies (3)

Category/License Group / ArtifactVersionUpdates
Config
Apache 2.0
com.typesafe » config 1.4.3
Dep Injection
Apache 2.0
javax.inject » javax.inject 12.0.1
JVM Languages
Apache 2.0
org.scala-lang » scala3-library_3 3.3.63.7.4

Test Dependencies (4)

Related Books

Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition)Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025)
by Snoke, Nancy
Cryptography (The MIT Press Essential Knowledge series)Cryptography (The MIT Press Essential Knowledge series) (2024)
by Louridas, Panos
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern EncryptionSerious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption (2024)
by Aumasson, Jean-Philippe
Cryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum CryptographyCryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography (2024)
by Bertaccini, Massimo
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum AlgorithmsUnderstanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms (2024)
by Paar, Christof, Pelzl, Jan, Güneysu, Tim
Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition)Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024)
by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam
The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and MoreThe Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022)
by Tijms, Arjan, Bais, Teo, Keil, Werner
Real-World CryptographyReal-World Cryptography (2021)
by Wong, David
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital EncryptionThe Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption (2018)
by Holden, Joshua
Serious Cryptography: A Practical Introduction to Modern EncryptionSerious Cryptography: A Practical Introduction to Modern Encryption (2017)
by Aumasson, Jean-Philippe
Understanding Cryptography: A Textbook for Students and PractitionersUnderstanding Cryptography: A Textbook for Students and Practitioners (2014)
by Paar, Christof, Pelzl, Jan, Preneel, Bart
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics) (2014)
by Hoffstein, Jeffrey, Pipher, Jill, Silverman, Joseph H.
Break the Code: Cryptography for Beginners (Dover Kids Activity Books)Break the Code: Cryptography for Beginners (Dover Kids Activity Books) (2013)
by Johnson, Bud
Java Security (2nd Edition)Java Security (2nd Edition) (2001)
by Oaks, Scott
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum CryptographyThe Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (2000)
by Singh, Simon