Generating PublicKey from x and y values of elliptic curve point. Codes to generate a public key in an elliptic curve algorithm using a given private key.
See: Description
Interface | Description |
---|---|
AlgorithmParameterSpec | A (transparent) specification of cryptographic parameters. |
ECField | This interface represents an elliptic curve (EC) finite field. |
KeySpec | A (transparent) specification of the key material that constitutes a cryptographic key. |
Class | Description |
---|---|
DSAGenParameterSpec | This immutable class specifies the set of parameters used for generating DSA parameters as specified in FIPS 186-3 Digital Signature Standard (DSS). |
DSAParameterSpec | This class specifies the set of parameters used with the DSA algorithm. |
DSAPrivateKeySpec | This class specifies a DSA private key with its associated parameters. |
DSAPublicKeySpec | This class specifies a DSA public key with its associated parameters. |
ECFieldF2m | This immutable class defines an elliptic curve (EC) characteristic 2 finite field. |
ECFieldFp | This immutable class defines an elliptic curve (EC) prime finite field. |
ECGenParameterSpec | This immutable class specifies the set of parameters used for generating elliptic curve (EC) domain parameters. |
ECParameterSpec | This immutable class specifies the set of domain parameters used with elliptic curve cryptography (ECC). |
ECPoint | This immutable class represents a point on an elliptic curve (EC) in affine coordinates. |
ECPrivateKeySpec | This immutable class specifies an elliptic curve private key with its associated parameters. |
ECPublicKeySpec | This immutable class specifies an elliptic curve public key with its associated parameters. |
EllipticCurve | This immutable class holds the necessary values needed to represent an elliptic curve. |
EncodedKeySpec | This class represents a public or private key in encoded format. |
MGF1ParameterSpec | This class specifies the set of parameters used with mask generation function MGF1 in OAEP Padding and RSASSA-PSS signature scheme, as defined in the PKCS#1 v2.2 standard. |
PKCS8EncodedKeySpec | This class represents the ASN.1 encoding of a private key, encoded according to the ASN.1 type PrivateKeyInfo . |
PSSParameterSpec | This class specifies a parameter spec for RSASSA-PSS signature scheme, as defined in the PKCS#1 v2.2 standard. |
RSAKeyGenParameterSpec | This class specifies the set of parameters used to generate an RSA key pair. |
RSAMultiPrimePrivateCrtKeySpec | This class specifies an RSA multi-prime private key, as defined in the PKCS#1 v2.2 standard using the Chinese Remainder Theorem (CRT) information values for efficiency. |
RSAOtherPrimeInfo | This class represents the triplet (prime, exponent, and coefficient) inside RSA's OtherPrimeInfo structure, as defined in the PKCS#1 v2.2 standard. |
RSAPrivateCrtKeySpec | This class specifies an RSA private key, as defined in the PKCS#1 v2.2 standard, using the Chinese Remainder Theorem (CRT) information values for efficiency. |
RSAPrivateKeySpec | |
RSAPublicKeySpec | This class specifies an RSA public key. |
X509EncodedKeySpec | This class represents the ASN.1 encoding of a public key, encoded according to the ASN.1 type SubjectPublicKeyInfo . |
Exception | Description |
---|---|
InvalidKeySpecException | This is the exception for invalid key specifications. |
InvalidParameterSpecException | This is the exception for invalid parameter specifications. |
A key specification is a transparent representation of the key material that constitutes a key. A key may be specified in an algorithm-specific way, or in an algorithm-independent encoding format (such as ASN.1). This package contains key specifications for DSA public and private keys, RSA public and private keys, PKCS #8 private keys in DER-encoded format, and X.509 public and private keys in DER-encoded format.
An algorithm parameter specification is a transparent representation of the sets of parameters used with an algorithm. This package contains an algorithm parameter specification for parameters used with the DSA algorithm.
Submit a bug or feature
For further API reference and developer documentation, see Java SE Documentation. That documentation contains more detailed, developer-targeted descriptions, with conceptual overviews, definitions of terms, workarounds, and working code examples.
Copyright © 1993, 2020, Oracle and/or its affiliates. All rights reserved. Use is subject to license terms. Also see the documentation redistribution policy.
Our releases are to prove that we can! This should be your intention too, as a user, to fully evaluate Call of Duty 2 withoutrestrictions and then decide.If you are keeping the software and want to use it longer than its trial time, we strongly encourage you purchasing the license keyfrom Call official website. Nothing can stop us, we keep fighting for freedomdespite all the difficulties we face each day.Last but not less important is your own contribution to our cause. Call of duty world war 2 key generator.
Scripting on this page tracks web page traffic, but does not change the content in any way.
Constructor and Description |
---|
EllipticCurve(ECField field, BigInteger a, BigInteger b) Creates an elliptic curve with the specified elliptic field field and the coefficients a and b . |
EllipticCurve(ECField field, BigInteger a, BigInteger b, byte[] seed) Creates an elliptic curve with the specified elliptic field field , the coefficients a and b , and the seed used for curve generation. |
Modifier and Type | Method and Description |
---|---|
boolean | equals(Object obj) Compares this elliptic curve for equality with the specified object. |
BigInteger | getA() Returns the first coefficient a of the elliptic curve. |
BigInteger | getB() Returns the second coefficient b of the elliptic curve. |
ECField | getField() Returns the finite field field that this elliptic curve is over. |
byte[] | getSeed() Returns the seeding bytes seed used during curve generation. |
int | hashCode() Returns a hash code value for this elliptic curve. |
clone, finalize, getClass, notify, notifyAll, toString, wait, wait, wait