loading...

# cryptography

👋 Sign in for the ability sort posts by top and latest.

How to Process Passwords as a Software Developer

Reactions 683 Comments 41
4 min read

Cyptography for Beginners

Reactions 214 Comments 2
5 min read

A Practical Guide to the Web Cryptography API

Reactions 130 Comments 6
5 min read

What I learned about cryptography in 3 weeks

Reactions 104 Comments 17
2 min read

Security and Cryptography Mistakes You Are Probably Doing All The Time

Reactions 89 Comments 2
6 min read

How SHA-2 Works Step-By-Step (SHA-256)

Reactions 85
9 min read

Blockchain: what is in a block?

Reactions 84 Comments 29
5 min read

Message Encryption in JavaScript and PHP

Reactions 71 Comments 4
3 min read

Why is Exclusive Or (XOR) Important in Cryptography?

Reactions 63 Comments 2
2 min read

How to share a secret?

Reactions 58
4 min read

Understanding public/private RSA keys

Reactions 53
4 min read

How To Build JWT’s in Go (Golang)

Reactions 50
3 min read

Use the Web Crypto API to Generate a Public / Private Key Pair for End to End, Asymmetric Cryptography on the Web

Reactions 49
3 min read

(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)

Reactions 46 Comments 1
5 min read

Sodium-Plus: A Positive Cryptography Experience for JavaScript Developers

Reactions 42 Comments 1
5 min read

RSA: How Maths will protect us while P!=NP

Reactions 41 Comments 1
8 min read

Is Open-Source Cryptography Really Secure?

Reactions 39
3 min read

Hashing Passwords – Python Cryptography Examples

Reactions 37 Comments 1
3 min read

(Very) Basic Intro to Lattices in Cryptography

Reactions 36
4 min read

PHP Security: Passwords

Reactions 35 Comments 21
4 min read

Fun with secrets

Reactions 28
3 min read

(Very) Basic Intro To White-Box Cryptography

Reactions 27
3 min read

Introduction To Data Encryption With Python

Reactions 23 Comments 3
6 min read

Store Encrypted Files in Google Drive

Reactions 22 Comments 3
12 min read

(Very) Basic intro to AES-256 Cipher

Reactions 20
5 min read

Absolute Security with No Trust

Reactions 19 Comments 2
5 min read

How Do Brute-Force Attackers Know They Found The Key?

Reactions 18 Comments 2
4 min read

They Who Control Encryption

Reactions 18 Comments 5
2 min read

GPG-signing your Git commits

Reactions 17 Comments 1
7 min read

Brute-forcing an encrypted message from Enigma using the web worker API

Reactions 16
13 min read

Making Sense of Public Key Cryptography

Reactions 16
12 min read

Symmetric Encryption Key Storage

Reactions 15 Comments 1
1 min read

Supply Chain Attacks and Secure Software Updates

Reactions 14
6 min read

“Big-O Algorithms” Course Released

Reactions 13
2 min read

NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain

Reactions 13
4 min read

Cryptography Trends And News Going Into 2020

Reactions 13
2 min read

HMAC and MAC Explained Simply – Building Secure Auth With JWTs

Reactions 13
1 min read

Enigma machine, how does the famous encryption device work?

Reactions 13
8 min read

PHP 7.2: The First Programming Language to Add Modern Cryptography to its Standard Library

Reactions 13 Comments 16
1 min read

4 ways of Symmetric Cryptography in JavaScript / How to AES with JavaScript

Reactions 12
18 min read

Schneier on Cryptography. 🎤Live Interview

Reactions 12
7 min read

Mirinae Development

Reactions 12
1 min read

How does Devise keep your passwords safe?

Reactions 12
1 min read

Digital signatures : a gentle introduction

Reactions 11
3 min read

Stop with the Obfuscation: Encoding and Encryption are Not the Same

Reactions 11 Comments 1
2 min read

Another Round of JWT.io and JWT Debugger Extension Updates

Reactions 11
1 min read

Java KeyStores—the gory details

Reactions 11 Comments 4
7 min read

Waves Technical Review

Reactions 11 Comments 1
6 min read

Cryptography Introduction: Block Ciphers

Reactions 11
12 min read

Will Banning Cryptography Keep the Country Safe?

Reactions 11
3 min read

Using cryptography to protect PII in GDPR protected jurisdictions

Reactions 10 Comments 1
13 min read

Building an Enigma machine with only TypeScript and then use Angular DI system to properly instantiate it

Reactions 10
17 min read

AES-256 Cipher – Python Cryptography Examples

Reactions 10 Comments 1
4 min read

Crypto Is Hard

Reactions 10
1 min read

What Is Entropy In Cryptography?

Reactions 10 Comments 1
3 min read

Secure Machine Learning

Reactions 10
4 min read

“Practical Cryptography” Course Released

Reactions 10
2 min read

Cryptography with Practical Examples in .Net Core

Reactions 9 Comments 1
6 min read

p.1 My attempt at building a Password Manager

Reactions 9 Comments 2
8 min read

A glimpse into the challenges of working with Cryptography APIs in NodeJS

Reactions 9
5 min read
loading...