DEV Community

loading...

# cryptography

👋 Sign in for the ability sort posts by top and latest.
Less obvious parts of security asymmetries, by Eugene Pilyankevich

Less obvious parts of security asymmetries, by Eugene Pilyankevich

Reactions 4 Comments
2 min read
Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova 03:26

Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova

Reactions 5 Comments
1 min read
Implementing End to End Encryption in your Cross Platform App (Part 2)

Implementing End to End Encryption in your Cross Platform App (Part 2)

Reactions 5 Comments
2 min read
Caesar Concatenation

Caesar Concatenation

Reactions 6 Comments 1
2 min read
Construct the Cypher string based on the given conditions

Construct the Cypher string based on the given conditions

Reactions 5 Comments
3 min read
Implementing End to End Encryption in your Cross Platform App (Part 1)

Implementing End to End Encryption in your Cross Platform App (Part 1)

Reactions 6 Comments
5 min read
Holiday readings in cryptography🎄☃️✨

Holiday readings in cryptography🎄☃️✨

Reactions 7 Comments
2 min read
Application level encryption for software architects: everything you need to know

Application level encryption for software architects: everything you need to know

Reactions 5 Comments
2 min read
The Handbook to GPG and Git

The Handbook to GPG and Git

Reactions 19 Comments
12 min read
Decoding the beauty of cryptography :

Decoding the beauty of cryptography :

Reactions 11 Comments
4 min read
Asymmetric Cryptography: Signing VS Encrypting

Asymmetric Cryptography: Signing VS Encrypting

Reactions 2 Comments
4 min read
RSA & How to Create encryption key?

RSA & How to Create encryption key?

Reactions 4 Comments
2 min read
📱Building reliable mobile app security 09:28

📱Building reliable mobile app security

Reactions 10 Comments
1 min read
Public key cryptography: RSA keys

Public key cryptography: RSA keys

Reactions 6 Comments
21 min read
Cyptography for Beginners

Cyptography for Beginners

Reactions 256 Comments 2
5 min read
Cryptographic Magic in Decentralized Storage

Cryptographic Magic in Decentralized Storage

Reactions 2 Comments
4 min read
Hotel Key Management

Hotel Key Management

Reactions 5 Comments
2 min read
Making Sense of Public Key Cryptography

Making Sense of Public Key Cryptography

Reactions 18 Comments 2
12 min read
How to share a secret?

How to share a secret?

Reactions 58 Comments
4 min read
“Big-O Algorithms” Course Released

“Big-O Algorithms” Course Released

Reactions 13 Comments
2 min read
💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

Reactions 8 Comments
3 min read
How get int from base64'd number bytes representation in Go

How get int from base64'd number bytes representation in Go

Reactions 6 Comments
1 min read
You don't need blockchain... until you do!

You don't need blockchain... until you do!

Reactions 3 Comments
3 min read
Cryptography Introduction: Block Ciphers

Cryptography Introduction: Block Ciphers

Reactions 13 Comments
12 min read
A Practical Guide to the Web Cryptography API

A Practical Guide to the Web Cryptography API

Reactions 152 Comments 6
5 min read
Schneier on Cryptography. 🎤Live Interview

Schneier on Cryptography. 🎤Live Interview

Reactions 13 Comments
7 min read
How to End-to-End Encrypt in Messages Using Twilio and Virgil Security

How to End-to-End Encrypt in Messages Using Twilio and Virgil Security

Reactions 4 Comments
7 min read
Bcrypt Step by Step

Bcrypt Step by Step

Reactions 8 Comments
5 min read
JWTs: Which Signing Algorithm Should I Use?

JWTs: Which Signing Algorithm Should I Use?

Reactions 6 Comments 3
10 min read
“Practical Cryptography” Course Released

“Practical Cryptography” Course Released

Reactions 12 Comments
2 min read
🚀 How to add Themis crypto-library to your app with 1 line of code

🚀 How to add Themis crypto-library to your app with 1 line of code

Reactions 5 Comments
2 min read
HMAC and MACs – The Inner Workings of JWTs

HMAC and MACs – The Inner Workings of JWTs

Reactions 6 Comments
4 min read
Blockchain e Cooperativismo lado a lado

Blockchain e Cooperativismo lado a lado

Reactions 2 Comments
3 min read
What is Cryptography?

What is Cryptography?

Reactions 3 Comments 1
16 min read
Creating Elliptical Curve Keys using OpenSSL

Creating Elliptical Curve Keys using OpenSSL

Reactions 6 Comments
3 min read
How Cryptographic Randomness with Entropy Vaguely Works

How Cryptographic Randomness with Entropy Vaguely Works

Reactions 6 Comments
3 min read
How SHA-2 Works Step-By-Step (SHA-256)

How SHA-2 Works Step-By-Step (SHA-256)

Reactions 85 Comments
9 min read
Understanding SHA256

Understanding SHA256

Reactions 3 Comments
4 min read
✨How to Run Secure Search over Encrypted Data

✨How to Run Secure Search over Encrypted Data

Reactions 9 Comments
4 min read
NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain

NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain

Reactions 14 Comments
4 min read
Cryptography with Practical Examples in .Net Core

Cryptography with Practical Examples in .Net Core

Reactions 10 Comments 2
6 min read
(Very) Basic Intro To White-Box Cryptography

(Very) Basic Intro To White-Box Cryptography

Reactions 28 Comments
3 min read
Introduction To Data Encryption With Python

Introduction To Data Encryption With Python

Reactions 31 Comments 3
6 min read
Playfair Cipher using HTML, CSS, JS

Playfair Cipher using HTML, CSS, JS

Reactions 4 Comments
1 min read
How To Build JWT’s in Go (Golang)

How To Build JWT’s in Go (Golang)

Reactions 50 Comments
3 min read
What Is Entropy In Cryptography?

What Is Entropy In Cryptography?

Reactions 11 Comments 1
3 min read
AES-256 Cipher – Python Cryptography Examples

AES-256 Cipher – Python Cryptography Examples

Reactions 11 Comments 1
4 min read
Will Banning Cryptography Keep the Country Safe?

Will Banning Cryptography Keep the Country Safe?

Reactions 12 Comments
3 min read
Hashing Passwords – Python Cryptography Examples

Hashing Passwords – Python Cryptography Examples

Reactions 37 Comments 1
3 min read
(Very) Basic Intro to Lattices in Cryptography

(Very) Basic Intro to Lattices in Cryptography

Reactions 37 Comments
4 min read
Why is Exclusive Or (XOR) Important in Cryptography?

Why is Exclusive Or (XOR) Important in Cryptography?

Reactions 63 Comments 2
2 min read
PGP Subkeys for Keybase

PGP Subkeys for Keybase

Reactions 3 Comments
3 min read
Cryptography Trends And News Going Into 2020

Cryptography Trends And News Going Into 2020

Reactions 14 Comments
2 min read
(Very) Basic intro to AES-256 Cipher

(Very) Basic intro to AES-256 Cipher

Reactions 20 Comments
5 min read
(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)

(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)

Reactions 46 Comments 1
5 min read
(Very) Basic Intro To Elliptic Curve Cryptography

(Very) Basic Intro To Elliptic Curve Cryptography

Reactions 10 Comments
7 min read
(Very) Basic Intro to Key Derivation Functions (Argon2, Scrypt, etc)

(Very) Basic Intro to Key Derivation Functions (Argon2, Scrypt, etc)

Reactions 6 Comments 2
3 min read
(Very) Basic Shamir’s Secret Sharing

(Very) Basic Shamir’s Secret Sharing

Reactions 10 Comments
3 min read
Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

Reactions 7 Comments
2 min read
Security and Cryptography Mistakes You Are Probably Doing All The Time

Security and Cryptography Mistakes You Are Probably Doing All The Time

Reactions 89 Comments 2
6 min read
loading...