DEV Community

# cryptography

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
HTTPS là gÏ mà web nào cŊng xài (Phần 1)

HTTPS là gÏ mà web nào cŊng xài (Phần 1)

1
Comments
6 min read
Monoalphabetic and Polyalphabetic Ciphers in Cryptography

Monoalphabetic and Polyalphabetic Ciphers in Cryptography

3
Comments
3 min read
Some notes on symmetric encryption in golang

Some notes on symmetric encryption in golang

3
Comments
2 min read
File Encryption in Rust

File Encryption in Rust

1
Comments
5 min read
libcert: Implementing S/MIME PKI in Lua (2)

libcert: Implementing S/MIME PKI in Lua (2)

Comments
10 min read
Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

3
Comments
3 min read
Encrypting with Block Ciphers: A Guide to AES, CBC, and More

Encrypting with Block Ciphers: A Guide to AES, CBC, and More

6
Comments
6 min read
Brute Force Attacks and CAPTCHA

Brute Force Attacks and CAPTCHA

33
Comments 1
2 min read
ZK Series #4 [ Sets, Groups, Rings , Finite Fields and Prime Fields]

ZK Series #4 [ Sets, Groups, Rings , Finite Fields and Prime Fields]

1
Comments
6 min read
Zero Knowledge Proofs Series #6 [Cryptographic Key Exchanges & Elliptic Curves I ]

Zero Knowledge Proofs Series #6 [Cryptographic Key Exchanges & Elliptic Curves I ]

2
Comments
5 min read
Secure Your Data: AES-GCM Encryption & Decryption for JavaScript, TypeScript, Java, and Python 🛡️🔐

Secure Your Data: AES-GCM Encryption & Decryption for JavaScript, TypeScript, Java, and Python 🛡️🔐

1
Comments
7 min read
ZKP Series #3 [Finite fields & Modular Arithmetic ]

ZKP Series #3 [Finite fields & Modular Arithmetic ]

3
Comments
7 min read
Zero Knowledge Proofs Series #2

Zero Knowledge Proofs Series #2

2
Comments
3 min read
How to share a secret

How to share a secret

3
Comments 3
6 min read
Criptografia #0 - Conceitos essenciais

Criptografia #0 - Conceitos essenciais

5
Comments
9 min read
Solving the CIA Kryptos Code (Part 1)

Solving the CIA Kryptos Code (Part 1)

7
Comments
7 min read
Solving the CIA Kryptos Code (Part 2)

Solving the CIA Kryptos Code (Part 2)

2
Comments
9 min read
Solving the CIA Kryptos Code (Part 3)

Solving the CIA Kryptos Code (Part 3)

2
Comments
10 min read
Solving the CIA Kryptos Code (Part 4)

Solving the CIA Kryptos Code (Part 4)

2
Comments
5 min read
🔐 Using Environment Variables a Little More Securely

🔐 Using Environment Variables a Little More Securely

Comments
3 min read
Some useful OpenSSL command

Some useful OpenSSL command

2
Comments
2 min read
Key repudiation in a web of trust

Key repudiation in a web of trust

Comments
2 min read
Encryption Part 4: Hashes

Encryption Part 4: Hashes

Comments
4 min read
Encryption Part 2: Diffie-Hellman & Public Key Cryptography

Encryption Part 2: Diffie-Hellman & Public Key Cryptography

Comments
6 min read
Digital certificates And PKI

Digital certificates And PKI

Comments
5 min read
[Challenge]: Nobody's solved this yet, can you?

[Challenge]: Nobody's solved this yet, can you?

6
Comments 7
1 min read
end-to-end encryption with sveltekit

end-to-end encryption with sveltekit

1
Comments
3 min read
What is Quantum Computer: explained in 5 mins

What is Quantum Computer: explained in 5 mins

Comments
4 min read
Cryptography: The Backbone of Bitcoin Transactions

Cryptography: The Backbone of Bitcoin Transactions

5
Comments
4 min read
Understanding the Vigenère Cipher

Understanding the Vigenère Cipher

4
Comments
6 min read
Hacking the Caesar Cipher

Hacking the Caesar Cipher

4
Comments
7 min read
Cryptography in Blockchain 🤑 | Symmetric Key Cryptography 🚀🚀 | Part-2

Cryptography in Blockchain 🤑 | Symmetric Key Cryptography 🚀🚀 | Part-2

2
Comments 1
1 min read
Zero Knowledge Proofs

Zero Knowledge Proofs

Comments
5 min read
Passwordless encryption with public key for GitHub

Passwordless encryption with public key for GitHub

3
Comments
10 min read
Secure Coding 101: How to Use Random Function

Secure Coding 101: How to Use Random Function

3
Comments
4 min read
Configuring GPG to sign Git commits

Configuring GPG to sign Git commits

Comments
3 min read
Cryptographically protecting your SPA

Cryptographically protecting your SPA

68
Comments 142
12 min read
Verifying Integrity of Files using NodeJS

Verifying Integrity of Files using NodeJS

33
Comments
3 min read
Breaking and building encryption in NFC digital wallets 📳

Breaking and building encryption in NFC digital wallets 📳

4
Comments
2 min read
Self Signed RSA Certificate with .NET 7

Self Signed RSA Certificate with .NET 7

Comments
3 min read
The Elliptic Curve Digital Signature Algorithm ECDSA

The Elliptic Curve Digital Signature Algorithm ECDSA

7
Comments
7 min read
Rotation keys in Golang

Rotation keys in Golang

4
Comments
4 min read
Searchable Symmetric Encryption (SSE) Basic Understanding In Go

Searchable Symmetric Encryption (SSE) Basic Understanding In Go

Comments
4 min read
How To Safely Verify MACs With Go And PHP Examples

How To Safely Verify MACs With Go And PHP Examples

Comments 1
5 min read
Basic End To End Encryption With Crypto

Basic End To End Encryption With Crypto

6
Comments 2
3 min read
Secret Key Encryption with Go using AES

Secret Key Encryption with Go using AES

10
Comments 6
6 min read
L'algoritmo ECDSA

L'algoritmo ECDSA

2
Comments
6 min read
Costruire una prova di Merkle e verificarla

Costruire una prova di Merkle e verificarla

2
Comments
5 min read
Decoding the Differences Between TLS, SSL, and HTTPS

Decoding the Differences Between TLS, SSL, and HTTPS

3
Comments
6 min read
Blockchain e struttura dei dati

Blockchain e struttura dei dati

1
Comments
6 min read
Verifying Git commits using GPG

Verifying Git commits using GPG

21
Comments 5
3 min read
Blockchain 101 - Public key cryptography

Blockchain 101 - Public key cryptography

3
Comments
4 min read
Smart contracts: audit ‘em all like a security engineer

Smart contracts: audit ‘em all like a security engineer

5
Comments
2 min read
Quick notes on cryptography for js devs

Quick notes on cryptography for js devs

4
Comments 1
4 min read
How to Play Rock-Paper-Scissors Over the Phone

How to Play Rock-Paper-Scissors Over the Phone

1
Comments
3 min read
How to encrypt data easily when your apps and databases are already running

How to encrypt data easily when your apps and databases are already running

7
Comments
2 min read
Signing XRPL transactions with AWS KMS

Signing XRPL transactions with AWS KMS

11
Comments
5 min read
Subscribe to a new newsletter for security-aware developers!

Subscribe to a new newsletter for security-aware developers!

6
Comments
1 min read
Cryptography basics: breaking repeated-key XOR ciphertext

Cryptography basics: breaking repeated-key XOR ciphertext

8
Comments
7 min read
Programming problem: Gematria

Programming problem: Gematria

6
Comments
5 min read
loading...