DEV Community

# cryptography

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Como Habilitar o Provedor Legado no OpenSSL 3.x

Como Habilitar o Provedor Legado no OpenSSL 3.x

Comments
2 min read
VB .Net: Secure Password

VB .Net: Secure Password

Comments
1 min read
C#: Secure Password

C#: Secure Password

Comments
1 min read
Enhancing Data Security with MongoDB: A Dive into Cryptography and CSFLE at Ovianta

Enhancing Data Security with MongoDB: A Dive into Cryptography and CSFLE at Ovianta

Comments
3 min read
What is Post-Quantum Cryptography (PQC) Migration and How to Secure Data Against Quantum Threats

What is Post-Quantum Cryptography (PQC) Migration and How to Secure Data Against Quantum Threats

Comments
3 min read
"Behind the Code: How Dark Web Drug Marketplaces Operate and the Developers Who Build Them"

"Behind the Code: How Dark Web Drug Marketplaces Operate and the Developers Who Build Them"

Comments
4 min read
The Ultimate Guide to Choosing the Right Cryptography Algorithm for Your Project

The Ultimate Guide to Choosing the Right Cryptography Algorithm for Your Project

Comments
4 min read
Lithe Crypt: Simplifying Encryption in PHP Applications

Lithe Crypt: Simplifying Encryption in PHP Applications

5
Comments
2 min read
Addressing The Threat of Deepfakes With Authentic Images

Addressing The Threat of Deepfakes With Authentic Images

Comments
8 min read
Camouflage-Shield: An Image Encryption Application.

Camouflage-Shield: An Image Encryption Application.

6
Comments
4 min read
Comparing Decentralized Identifiers(DID) Methods

Comparing Decentralized Identifiers(DID) Methods

9
Comments
5 min read
Decentralized Identity Simplified: How to Resolve DIDs Effectively

Decentralized Identity Simplified: How to Resolve DIDs Effectively

3
Comments
3 min read
Key Management for DIDs in Web5: A Beginner’s Guide

Key Management for DIDs in Web5: A Beginner’s Guide

6
Comments
4 min read
Key Management for DIDs: A Beginner's Journey

Key Management for DIDs: A Beginner's Journey

1
Comments
4 min read
Understanding Web5 and Its Potential

Understanding Web5 and Its Potential

17
Comments 7
4 min read
Cryptography in Networking

Cryptography in Networking

1
Comments
9 min read
Day ??? of learning go. Building cli apps

Day ??? of learning go. Building cli apps

Comments
2 min read
GnuPG and Digital Signatures

GnuPG and Digital Signatures

Comments
4 min read
Cryptography Concepts Simplified

Cryptography Concepts Simplified

Comments
2 min read
The Hitchhiker’s Guide to Building an Encrypted Filesystem in Rust

The Hitchhiker’s Guide to Building an Encrypted Filesystem in Rust

1
Comments
1 min read
Cryptography #0 - Essential Concepts

Cryptography #0 - Essential Concepts

5
Comments
7 min read
An Introduction to Leo: Crafting Privacy-Preserving Blockchain Applications

An Introduction to Leo: Crafting Privacy-Preserving Blockchain Applications

1
Comments
6 min read
Preventing Weak Cryptography in JavaScript

Preventing Weak Cryptography in JavaScript

Comments
3 min read
Symmetric and Asymmetric Cryptography

Symmetric and Asymmetric Cryptography

Comments
2 min read
Confusion vs Diffusion in cryptography

Confusion vs Diffusion in cryptography

Comments
1 min read
signify: replacement for PGP signing?

signify: replacement for PGP signing?

1
Comments 3
2 min read
HTTPS là gì mà web nào cũng xài (Phần 1)

HTTPS là gì mà web nào cũng xài (Phần 1)

1
Comments
6 min read
The core of WhatApp and Signal: Diffie-Hellman key exchange

The core of WhatApp and Signal: Diffie-Hellman key exchange

Comments
3 min read
Monoalphabetic and Polyalphabetic Ciphers in Cryptography

Monoalphabetic and Polyalphabetic Ciphers in Cryptography

2
Comments
3 min read
Some notes on symmetric encryption in golang

Some notes on symmetric encryption in golang

2
Comments 1
2 min read
Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

3
Comments
3 min read
File Encryption in Rust

File Encryption in Rust

8
Comments 1
5 min read
Encrypting with Block Ciphers: A Guide to AES, CBC, and More

Encrypting with Block Ciphers: A Guide to AES, CBC, and More

8
Comments
6 min read
Brute Force Attacks and CAPTCHA

Brute Force Attacks and CAPTCHA

37
Comments 1
2 min read
libcert: Implementing S/MIME PKI in Lua (2)

libcert: Implementing S/MIME PKI in Lua (2)

Comments
10 min read
ZK Series #4 [ Sets, Groups, Rings , Finite Fields and Prime Fields]

ZK Series #4 [ Sets, Groups, Rings , Finite Fields and Prime Fields]

1
Comments
6 min read
Zero Knowledge Proofs Series #6 [Cryptographic Key Exchanges & Elliptic Curves I ]

Zero Knowledge Proofs Series #6 [Cryptographic Key Exchanges & Elliptic Curves I ]

4
Comments
5 min read
Secure Your Data: AES-GCM Encryption & Decryption for JavaScript, TypeScript, Java, and Python 🛡️🔐

Secure Your Data: AES-GCM Encryption & Decryption for JavaScript, TypeScript, Java, and Python 🛡️🔐

17
Comments
7 min read
ZKP Series #3 [Finite fields & Modular Arithmetic ]

ZKP Series #3 [Finite fields & Modular Arithmetic ]

4
Comments
7 min read
Zero Knowledge Proofs Series #2

Zero Knowledge Proofs Series #2

2
Comments
3 min read
How to share a secret

How to share a secret

3
Comments 3
6 min read
Solving the CIA Kryptos Code (Part 2)

Solving the CIA Kryptos Code (Part 2)

2
Comments
9 min read
Solving the CIA Kryptos Code (Part 4)

Solving the CIA Kryptos Code (Part 4)

2
Comments
5 min read
Solving the CIA Kryptos Code (Part 3)

Solving the CIA Kryptos Code (Part 3)

2
Comments
10 min read
🔐 Using Environment Variables a Little More Securely

🔐 Using Environment Variables a Little More Securely

Comments
3 min read
Introduction to QuantCrypt: A Python Library for Quantum-Resistant Cryptography

Introduction to QuantCrypt: A Python Library for Quantum-Resistant Cryptography

1
Comments
4 min read
Some useful OpenSSL command

Some useful OpenSSL command

2
Comments
2 min read
Solving the CIA Kryptos Code (Part 1)

Solving the CIA Kryptos Code (Part 1)

7
Comments
7 min read
Key repudiation in a web of trust

Key repudiation in a web of trust

Comments
2 min read
Encryption Part 4: Hashes

Encryption Part 4: Hashes

Comments
4 min read
Criptografia #0 - Conceitos essenciais

Criptografia #0 - Conceitos essenciais

6
Comments
7 min read
Encryption Part 2: Diffie-Hellman & Public Key Cryptography

Encryption Part 2: Diffie-Hellman & Public Key Cryptography

Comments
6 min read
Digital certificates And PKI

Digital certificates And PKI

Comments
5 min read
[Challenge]: Nobody's solved this yet, can you?

[Challenge]: Nobody's solved this yet, can you?

6
Comments 7
1 min read
My Hacktoberfest 2023 Journey: Contributing to Open Source and Planting Trees

My Hacktoberfest 2023 Journey: Contributing to Open Source and Planting Trees

1
Comments
2 min read
end-to-end encryption with sveltekit

end-to-end encryption with sveltekit

1
Comments
3 min read
Cryptography: The Backbone of Bitcoin Transactions

Cryptography: The Backbone of Bitcoin Transactions

5
Comments
4 min read
Understanding the Vigenère Cipher

Understanding the Vigenère Cipher

10
Comments
6 min read
Hacking the Caesar Cipher

Hacking the Caesar Cipher

5
Comments
7 min read
What is Quantum Computer: explained in 5 mins

What is Quantum Computer: explained in 5 mins

Comments
4 min read
loading...