DEV Community

# cryptography

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
libcert: Implementing S/MIME PKI in Lua (2)

libcert: Implementing S/MIME PKI in Lua (2)

Comments
10 min read
libcert: Implementing S/MIME PKI in Lua (1)

libcert: Implementing S/MIME PKI in Lua (1)

Comments
6 min read
Zero Knowledge Proofs Series #6 [Cryptographic Key Exchanges & Elliptic Curves I ]

Zero Knowledge Proofs Series #6 [Cryptographic Key Exchanges & Elliptic Curves I ]

2
Comments
5 min read
Secure Your Data: AES-GCM Encryption & Decryption for JavaScript, TypeScript, Java, and Python 🛡️🔐

Secure Your Data: AES-GCM Encryption & Decryption for JavaScript, TypeScript, Java, and Python 🛡️🔐

1
Comments
7 min read
ZK Series #4 [ Sets, Groups, Rings , Finite Fields and Prime Fields]

ZK Series #4 [ Sets, Groups, Rings , Finite Fields and Prime Fields]

1
Comments
6 min read
ZKP Series #3 [Finite fields & Modular Arithmetic ]

ZKP Series #3 [Finite fields & Modular Arithmetic ]

3
Comments
7 min read
Zero Knowledge Proofs Series #2

Zero Knowledge Proofs Series #2

2
Comments
3 min read
How to share a secret

How to share a secret

3
Comments 3
6 min read
Encrypt/Decrypt File Using Openssl

Encrypt/Decrypt File Using Openssl

Comments
2 min read
What is Cryptography?

What is Cryptography?

Comments 1
3 min read
🔐 Using Environment Variables a Little More Securely

🔐 Using Environment Variables a Little More Securely

Comments
3 min read
Introduction to QuantCrypt: A Python Library for Quantum-Resistant Cryptography

Introduction to QuantCrypt: A Python Library for Quantum-Resistant Cryptography

Comments
4 min read
Shamir's secret sharing

Shamir's secret sharing

1
Comments
1 min read
Some useful OpenSSL command

Some useful OpenSSL command

2
Comments
2 min read
Key repudiation in a web of trust

Key repudiation in a web of trust

Comments
2 min read
Encryption Part 4: Hashes

Encryption Part 4: Hashes

Comments
4 min read
Solving the CIA Kryptos Code (Part 4)

Solving the CIA Kryptos Code (Part 4)

2
Comments
5 min read
Solving the CIA Kryptos Code (Part 3)

Solving the CIA Kryptos Code (Part 3)

2
Comments
10 min read
Solving the CIA Kryptos Code (Part 2)

Solving the CIA Kryptos Code (Part 2)

2
Comments
9 min read
Solving the CIA Kryptos Code (Part 1)

Solving the CIA Kryptos Code (Part 1)

7
Comments
7 min read
Criptografia #0 - Conceitos essenciais

Criptografia #0 - Conceitos essenciais

5
Comments
9 min read
Understanding Interactive Proof Systems and Sum Check Protocol: Part 1

Understanding Interactive Proof Systems and Sum Check Protocol: Part 1

Comments
5 min read
Encryption Part 2: Diffie-Hellman & Public Key Cryptography

Encryption Part 2: Diffie-Hellman & Public Key Cryptography

Comments
6 min read
PETAce — Using Applied Cryptography to Enhance Privacy

PETAce — Using Applied Cryptography to Enhance Privacy

Comments
7 min read
OpenSSH new encryption keys

OpenSSH new encryption keys

Comments
1 min read
[Challenge]: Nobody's solved this yet, can you?

[Challenge]: Nobody's solved this yet, can you?

6
Comments 7
1 min read
Digital certificates And PKI

Digital certificates And PKI

Comments
5 min read
My Hacktoberfest 2023 Journey: Contributing to Open Source and Planting Trees

My Hacktoberfest 2023 Journey: Contributing to Open Source and Planting Trees

1
Comments
2 min read
Sensitive Data Exposure through Cryptographic failures

Sensitive Data Exposure through Cryptographic failures

Comments
3 min read
end-to-end encryption with sveltekit

end-to-end encryption with sveltekit

1
Comments
3 min read
Cryptography: The Backbone of Bitcoin Transactions

Cryptography: The Backbone of Bitcoin Transactions

5
Comments
4 min read
Resources for learning Zero Knowledge Proofs

Resources for learning Zero Knowledge Proofs

Comments
1 min read
Polynomial Commitment using IPA(Inner Product Argument) explained to beginner.

Polynomial Commitment using IPA(Inner Product Argument) explained to beginner.

Comments
3 min read
Understanding the Vigenère Cipher

Understanding the Vigenère Cipher

4
Comments
6 min read
Hacking the Caesar Cipher

Hacking the Caesar Cipher

4
Comments
7 min read
What is Quantum Computer: explained in 5 mins

What is Quantum Computer: explained in 5 mins

Comments
4 min read
Group

Group

Comments
4 min read
Private Keys, Public Keys, and Addresses

Private Keys, Public Keys, and Addresses

Comments
4 min read
Skiff Crypto docs

Skiff Crypto docs

2
Comments 1
1 min read
Understanding Digital Signatures: The Role of v, r, s in Cryptographic Security and Signature Verification.

Understanding Digital Signatures: The Role of v, r, s in Cryptographic Security and Signature Verification.

Comments
8 min read
Cryptography in Blockchain 🤑 | Symmetric Key Cryptography 🚀🚀 | Part-2

Cryptography in Blockchain 🤑 | Symmetric Key Cryptography 🚀🚀 | Part-2

2
Comments 1
1 min read
Zero Knowledge Proofs

Zero Knowledge Proofs

Comments
5 min read
Passwordless encryption with public key for GitHub

Passwordless encryption with public key for GitHub

3
Comments
10 min read
Secure Coding 101: How to Use Random Function

Secure Coding 101: How to Use Random Function

3
Comments
4 min read
Configuring GPG to sign Git commits

Configuring GPG to sign Git commits

Comments
3 min read
How zk Rollups are Revolutionizing Blockchain Technology

How zk Rollups are Revolutionizing Blockchain Technology

Comments
1 min read
Verifying Integrity of Files using NodeJS

Verifying Integrity of Files using NodeJS

33
Comments
3 min read
Breaking and building encryption in NFC digital wallets 📳

Breaking and building encryption in NFC digital wallets 📳

4
Comments
2 min read
The Elliptic Curve Digital Signature Algorithm ECDSA

The Elliptic Curve Digital Signature Algorithm ECDSA

7
Comments
7 min read
Unveiling the Power of Zero Knowledge Cryptography in Blockchain: A Comprehensive Guide on How It Works and Its Applications

Unveiling the Power of Zero Knowledge Cryptography in Blockchain: A Comprehensive Guide on How It Works and Its Applications

Comments
4 min read
Cryptographically protecting your SPA

Cryptographically protecting your SPA

68
Comments 142
12 min read
Rotation keys in Golang

Rotation keys in Golang

4
Comments
4 min read
Cryptographic Hash Function

Cryptographic Hash Function

Comments
2 min read
BLOCKCHAIN COMPONENTS CONCEPTS: Distributed Ledger Technology (DLT)

BLOCKCHAIN COMPONENTS CONCEPTS: Distributed Ledger Technology (DLT)

1
Comments
3 min read
Encryption Part 1: Introduction to Encryption

Encryption Part 1: Introduction to Encryption

Comments
3 min read
An Introduction to Cryptography and Private/Public Keys in Ethereum

An Introduction to Cryptography and Private/Public Keys in Ethereum

Comments
5 min read
How To Safely Verify MACs With Go And PHP Examples

How To Safely Verify MACs With Go And PHP Examples

Comments 1
5 min read
Self Signed RSA Certificate with .NET 7

Self Signed RSA Certificate with .NET 7

Comments
3 min read
Searchable Symmetric Encryption (SSE) Basic Understanding In Go

Searchable Symmetric Encryption (SSE) Basic Understanding In Go

Comments
4 min read
Basic End To End Encryption With Crypto

Basic End To End Encryption With Crypto

6
Comments 2
3 min read
loading...