https://cr.yp.to/talks/2015.10.05/slides-djb-20151005-a4.pdf
Unfortunately, Java encryption libraries are far from boring.
https://www.bleepingcomputer.com/news/security/bouncy-castle...
https://www.cvedetails.com/vulnerability-list/vendor_id-7637...