DEV Community

# cryptography

Posts

ūüĎč Sign in for the ability to sort posts by relevant, latest, or top.
Breaking and building encryption in NFC digital wallets ūüď≥

Breaking and building encryption in NFC digital wallets ūüď≥

4
Comments
2 min read
The Elliptic Curve Digital Signature Algorithm ECDSA

The Elliptic Curve Digital Signature Algorithm ECDSA

5
Comments
7 min read
Cryptographically protecting your SPA

Cryptographically protecting your SPA

63
Comments 141
12 min read
Self Signed RSA Certificate with .NET 7

Self Signed RSA Certificate with .NET 7

Comments
3 min read
Rotation keys in Golang

Rotation keys in Golang

4
Comments
4 min read
Searchable Symmetric Encryption (SSE) Basic Understanding In Go

Searchable Symmetric Encryption (SSE) Basic Understanding In Go

Comments
4 min read
How To Safely Verify MACs With Go And PHP Examples

How To Safely Verify MACs With Go And PHP Examples

Comments
5 min read
Basic End To End Encryption With Crypto

Basic End To End Encryption With Crypto

5
Comments
3 min read
Costruire una prova di Merkle e verificarla

Costruire una prova di Merkle e verificarla

1
Comments
5 min read
Secret Key Encryption with Go using AES

Secret Key Encryption with Go using AES

18
Comments 4
6 min read
L'algoritmo ECDSA

L'algoritmo ECDSA

2
Comments
6 min read
Decoding the Differences Between TLS, SSL, and HTTPS

Decoding the Differences Between TLS, SSL, and HTTPS

3
Comments
6 min read
Blockchain e struttura dei dati

Blockchain e struttura dei dati

Comments
6 min read
Verifying Git commits using GPG

Verifying Git commits using GPG

21
Comments 5
3 min read
Blockchain 101 - Public key cryptography

Blockchain 101 - Public key cryptography

3
Comments
4 min read
Quick notes on cryptography for js devs

Quick notes on cryptography for js devs

4
Comments
4 min read
Smart contracts: audit ‚Äėem all like a security engineer

Smart contracts: audit ‚Äėem all like a security engineer

5
Comments
2 min read
How to Play Rock-Paper-Scissors Over the Phone

How to Play Rock-Paper-Scissors Over the Phone

1
Comments
3 min read
How to encrypt data easily when your apps and databases are already running

How to encrypt data easily when your apps and databases are already running

7
Comments
2 min read
Signing XRPL transactions with AWS KMS

Signing XRPL transactions with AWS KMS

8
Comments
5 min read
Subscribe to a new newsletter for security-aware developers!

Subscribe to a new newsletter for security-aware developers!

6
Comments
1 min read
Cryptography basics: breaking repeated-key XOR ciphertext

Cryptography basics: breaking repeated-key XOR ciphertext

8
Comments
7 min read
Programming problem: Gematria

Programming problem: Gematria

6
Comments
5 min read
Encryption: Understanding the Public Key and Private Key

Encryption: Understanding the Public Key and Private Key

11
Comments
3 min read
Improving security & cryptography in popular cryptocurrency wallets

Improving security & cryptography in popular cryptocurrency wallets

10
Comments
2 min read
Tutorial One Time Pad (Vernam Cipher) Algorithm

Tutorial One Time Pad (Vernam Cipher) Algorithm

6
Comments
3 min read
Cyber Apocalypse CTF 2022 Writeup - Down the Rabinhole

Cyber Apocalypse CTF 2022 Writeup - Down the Rabinhole

6
Comments
5 min read
Calling the brute(force) squad

Calling the brute(force) squad

5
Comments
6 min read
Encryption in ‚õÖ cloud native apps

Encryption in ‚õÖ cloud native apps

11
Comments
3 min read
Cryptography for beginners

Cryptography for beginners

11
Comments
5 min read
Public key cryptography: OpenSSH private keys

Public key cryptography: OpenSSH private keys

6
Comments
14 min read
https

https

5
Comments
4 min read
Essential Cryptography for JavaScript Developers

Essential Cryptography for JavaScript Developers

4
Comments
5 min read
ECDSA in Bitcoin

ECDSA in Bitcoin

6
Comments
2 min read
Acra. Features: Integrate data protection that fits your architecture

Acra. Features: Integrate data protection that fits your architecture

9
Comments 1
2 min read
Acra. Features: Security events automation

Acra. Features: Security events automation

9
Comments
2 min read
Acra. Features: Logging, audit logging and crypto-signed audit logs

Acra. Features: Logging, audit logging and crypto-signed audit logs

9
Comments
2 min read
ūüö© Insomni'hack 2022 CTF write-up

ūüö© Insomni'hack 2022 CTF write-up

8
Comments
11 min read
How I REACTO to Algos: Caesar Decipher

How I REACTO to Algos: Caesar Decipher

5
Comments
8 min read
team up for Bug bounty Hunter

team up for Bug bounty Hunter

5
Comments
1 min read
Acra. Features: Data leakage detection

Acra. Features: Data leakage detection

9
Comments
2 min read
Signatures as Authentication in Web3

Signatures as Authentication in Web3

16
Comments
3 min read
How I REACTO to Algos: Caesar Cipher

How I REACTO to Algos: Caesar Cipher

6
Comments
10 min read
Lava lamps securing the Web?ūü§∑‚Äć‚ôāÔłŹ

Lava lamps securing the Web?ūü§∑‚Äć‚ôāÔłŹ

5
Comments
1 min read
Acra. Features: Database request firewall

Acra. Features: Database request firewall

5
Comments
2 min read
Randomness and Cryptography

Randomness and Cryptography

4
Comments
5 min read
Exploring ūüö©ūüö©ūüö©red flags in React Native security libraries

Exploring ūüö©ūüö©ūüö©red flags in React Native security libraries

5
Comments
2 min read
CryptoPals Crypto Challenges Using Rust: Implement CBC Mode

CryptoPals Crypto Challenges Using Rust: Implement CBC Mode

2
Comments
3 min read
Acra. Features: Authentication

Acra. Features: Authentication

8
Comments
1 min read
Acra. Features: Tokenization

Acra. Features: Tokenization

8
Comments
1 min read
Is random() really random ?

Is random() really random ?

12
Comments 4
4 min read
.NET: Modelo Criptogr√°fico, lo que necesitas saber.

.NET: Modelo Criptogr√°fico, lo que necesitas saber.

12
Comments
10 min read
CryptoPals Crypto Challenges Using Rust: Implement PKCS#7 Padding

CryptoPals Crypto Challenges Using Rust: Implement PKCS#7 Padding

7
Comments
1 min read
CryptoPals Crypto Challenges Using Rust: Detect AES in ECB mode

CryptoPals Crypto Challenges Using Rust: Detect AES in ECB mode

6
Comments
2 min read
CryptoPals Crypto Challenges Using Rust: AES in ECB mode

CryptoPals Crypto Challenges Using Rust: AES in ECB mode

6
Comments
3 min read
CryptoPals Crypto Challenges Using Rust: Break repeating-key XOR

CryptoPals Crypto Challenges Using Rust: Break repeating-key XOR

5
Comments
5 min read
CryptoPals Crypto Challenges Using Rust: Implement repeating-key XOR

CryptoPals Crypto Challenges Using Rust: Implement repeating-key XOR

5
Comments
1 min read
CryptoPals Crypto Challenges Using Rust: Detect single-character XOR

CryptoPals Crypto Challenges Using Rust: Detect single-character XOR

6
Comments
2 min read
CryptoPals Crypto Challenges Using Rust: Single-byte xor cipher

CryptoPals Crypto Challenges Using Rust: Single-byte xor cipher

5
Comments
3 min read
CryptoPals Crypto Challenges Using Rust: Fixed XOR

CryptoPals Crypto Challenges Using Rust: Fixed XOR

5
Comments
1 min read
loading...