{"payload":{"header_redesign_enabled":false,"results":[{"id":"166262656","archived":false,"color":"#b07219","followers":3,"has_funding_file":false,"hl_name":"piyushkamalanand/Information-Security-Using-Java","hl_trunc_description":"Encryption And Decryption Using Different Symmetric And Asymmetric Algorithms.","language":"Java","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":166262656,"name":"Information-Security-Using-Java","owner_id":40653645,"owner_login":"piyushkamalanand","updated_at":"2019-01-17T17:02:46.476Z","has_issues":true}},"sponsorable":false,"topics":["security","cryptography","aes-encryption","information-security","encryption-algorithms","encryption-decryption","asymmetric-cryptography","rsa-algorithm","symmetric-cryptography","tripledescryptoserviceprovider"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":99,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Apiyushkamalanand%252FInformation-Security-Using-Java%2B%2Blanguage%253AJava","metadata":null,"warn_limited_results":false,"csrf_tokens":{"/piyushkamalanand/Information-Security-Using-Java/star":{"post":"8Mw-YAVWoIFtZ-_ioBN4F7uJN6MeJZy2rAm5hF2Fi5lrSW9aNQsqrYsrwYLauYilHwUT54lYBC4Efnj9DR99Uw"},"/piyushkamalanand/Information-Security-Using-Java/unstar":{"post":"6nN5zGypXcZh7OtTFHp3dsygEuzJriWtadECneuICzyyZXjZi_228fHT_S46IaujYLicChMYa2pTQYks1-9IVg"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"AK2B2eOiV5f96R5d_gNcy-x42VSlfCOMbmEvpr5DqSqduuWkwgafnzvSpycOgnRWgi-MF5YDdPdqS5_pin_LeA"}}},"title":"Repository search results"}