1. Accompanying online artifact page. http://www.st.informatik.tu-darmstadt.de/artifacts/crypto-api-misuse. Accompanying online artifact page. http://www.st.informatik.tu-darmstadt.de/artifacts/crypto-api-misuse.
2. Bouncy Castle. www.bouncycastle.org. Bouncy Castle. www.bouncycastle.org.
3. GitHub search APIs. https://developer.github.com/v3/search/. GitHub search APIs. https://developer.github.com/v3/search/.
4. Java Cryptography Architecture (JCA). http://docs.oracle.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html. Java Cryptography Architecture (JCA). http://docs.oracle.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html.
5. JCE unlimited strength setup. http://www.oracle.com/technetwork/java/javase/downloads/jce8-download-2133166.html. JCE unlimited strength setup. http://www.oracle.com/technetwork/java/javase/downloads/jce8-download-2133166.html.