DEV Community

# cryptography

Posts

ūüĎč Sign in for the ability to sort posts by relevant, latest, or top.
Improving security & cryptography in popular cryptocurrency wallets

Improving security & cryptography in popular cryptocurrency wallets

Reactions 10 Comments
2 min read
Programming problem: Gematria

Programming problem: Gematria

Reactions 6 Comments
5 min read
Encryption: Understanding the Public Key and Private Key

Encryption: Understanding the Public Key and Private Key

Reactions 10 Comments
3 min read
Cyber Apocalypse CTF 2022 Writeup - Down the Rabinhole

Cyber Apocalypse CTF 2022 Writeup - Down the Rabinhole

Reactions 6 Comments
5 min read
Tutorial One Time Pad (Vernam Cipher) Algorithm

Tutorial One Time Pad (Vernam Cipher) Algorithm

Reactions 6 Comments
3 min read
Encryption in ‚õÖ cloud native apps

Encryption in ‚õÖ cloud native apps

Reactions 11 Comments
3 min read
Calling the brute(force) squad

Calling the brute(force) squad

Reactions 5 Comments
6 min read
Cryptography for beginners

Cryptography for beginners

Reactions 9 Comments
5 min read
Public key cryptography: OpenSSH private keys

Public key cryptography: OpenSSH private keys

Reactions 6 Comments
14 min read
https

https

Reactions 5 Comments
4 min read
Essential Cryptography for JavaScript Developers

Essential Cryptography for JavaScript Developers

Reactions 4 Comments
5 min read
ECDSA in Bitcoin

ECDSA in Bitcoin

Reactions 5 Comments
2 min read
Acra. Features: Integrate data protection that fits your architecture

Acra. Features: Integrate data protection that fits your architecture

Reactions 11 Comments
2 min read
Lava lamps securing the Web?ūü§∑‚Äć‚ôāÔłŹ

Lava lamps securing the Web?ūü§∑‚Äć‚ôāÔłŹ

Reactions 5 Comments
1 min read
Acra. Features: Security events automation

Acra. Features: Security events automation

Reactions 11 Comments
2 min read
CTF Writeup: picoCTF 2022 Cryptography

CTF Writeup: picoCTF 2022 Cryptography

Reactions 6 Comments
11 min read
Acra. Features: Logging, audit logging and crypto-signed audit logs

Acra. Features: Logging, audit logging and crypto-signed audit logs

Reactions 11 Comments
2 min read
ūüö© Insomni'hack 2022 CTF write-up

ūüö© Insomni'hack 2022 CTF write-up

Reactions 8 Comments
11 min read
How I REACTO to Algos: Caesar Decipher

How I REACTO to Algos: Caesar Decipher

Reactions 5 Comments
8 min read
team up for Bug bounty Hunter

team up for Bug bounty Hunter

Reactions 5 Comments
1 min read
Acra. Features: Data leakage detection

Acra. Features: Data leakage detection

Reactions 11 Comments
2 min read
Signatures as Authentication in Web3

Signatures as Authentication in Web3

Reactions 7 Comments
3 min read
How I REACTO to Algos: Caesar Cipher

How I REACTO to Algos: Caesar Cipher

Reactions 6 Comments
10 min read
Acra. Features: Database request firewall

Acra. Features: Database request firewall

Reactions 7 Comments
2 min read
Randomness and Cryptography

Randomness and Cryptography

Reactions 4 Comments
5 min read
Exploring ūüö©ūüö©ūüö©red flags in React Native security libraries

Exploring ūüö©ūüö©ūüö©red flags in React Native security libraries

Reactions 7 Comments
2 min read
CryptoPals Crypto Challenges Using Rust: Implement CBC Mode

CryptoPals Crypto Challenges Using Rust: Implement CBC Mode

Reactions 2 Comments
3 min read
Acra. Features: Authentication

Acra. Features: Authentication

Reactions 9 Comments
1 min read
Acra. Features: Tokenization

Acra. Features: Tokenization

Reactions 10 Comments
1 min read
Is random() really random ?

Is random() really random ?

Reactions 12 Comments 4
4 min read
.NET: Modelo Criptogr√°fico, lo que necesitas saber.

.NET: Modelo Criptogr√°fico, lo que necesitas saber.

Reactions 8 Comments
10 min read
CryptoPals Crypto Challenges Using Rust: Implement PKCS#7 Padding

CryptoPals Crypto Challenges Using Rust: Implement PKCS#7 Padding

Reactions 7 Comments
1 min read
CryptoPals Crypto Challenges Using Rust: Detect AES in ECB mode

CryptoPals Crypto Challenges Using Rust: Detect AES in ECB mode

Reactions 6 Comments
2 min read
CryptoPals Crypto Challenges Using Rust: AES in ECB mode

CryptoPals Crypto Challenges Using Rust: AES in ECB mode

Reactions 6 Comments
3 min read
CryptoPals Crypto Challenges Using Rust: Break repeating-key XOR

CryptoPals Crypto Challenges Using Rust: Break repeating-key XOR

Reactions 5 Comments
5 min read
CryptoPals Crypto Challenges Using Rust: Implement repeating-key XOR

CryptoPals Crypto Challenges Using Rust: Implement repeating-key XOR

Reactions 5 Comments
1 min read
CryptoPals Crypto Challenges Using Rust: Detect single-character XOR

CryptoPals Crypto Challenges Using Rust: Detect single-character XOR

Reactions 6 Comments
2 min read
CryptoPals Crypto Challenges Using Rust: Single-byte xor cipher

CryptoPals Crypto Challenges Using Rust: Single-byte xor cipher

Reactions 5 Comments
3 min read
CryptoPals Crypto Challenges Using Rust: Fixed XOR

CryptoPals Crypto Challenges Using Rust: Fixed XOR

Reactions 5 Comments
1 min read
CryptoPals Crypto Challenges Using Rust: Convert hex to base64

CryptoPals Crypto Challenges Using Rust: Convert hex to base64

Reactions 7 Comments
2 min read
Hashing, Explain it to me like I'm 5.

Hashing, Explain it to me like I'm 5.

Reactions 4 Comments
1 min read
100 Languages Speedrun: Episode 30: SageMath

100 Languages Speedrun: Episode 30: SageMath

Reactions 5 Comments
6 min read
How to build a secure crypto wallet

How to build a secure crypto wallet

Reactions 11 Comments 2
1 min read
Verifying GPG signatures: history, terms and a how-to guide

Verifying GPG signatures: history, terms and a how-to guide

Reactions 5 Comments
6 min read
Acra. Features: Data masking

Acra. Features: Data masking

Reactions 10 Comments
1 min read
SafeCloset, a Secret Safe - Why and how I made it in Rust

SafeCloset, a Secret Safe - Why and how I made it in Rust

Reactions 14 Comments 3
4 min read
Acra. Features: Searchable encryption

Acra. Features: Searchable encryption

Reactions 10 Comments
2 min read
Acra. Features: Application-level encryption

Acra. Features: Application-level encryption

Reactions 10 Comments
3 min read
Say goodbye to passwords: WebAuthn, the foundations

Say goodbye to passwords: WebAuthn, the foundations

Reactions 8 Comments
5 min read
Caesar Cipher: A Simple Encryption System in PicoLisp

Caesar Cipher: A Simple Encryption System in PicoLisp

Reactions 5 Comments
7 min read
Brief Dive into Ring Signatures

Brief Dive into Ring Signatures

Reactions 3 Comments
9 min read
Password Encryption with Hash Function in Python

Password Encryption with Hash Function in Python

Reactions 7 Comments
2 min read
History of Cryptography

History of Cryptography

Reactions 2 Comments
2 min read
Brief ETH Wallet Security Guide

Brief ETH Wallet Security Guide

Reactions 4 Comments
8 min read
Application-Layer Encryption Defined

Application-Layer Encryption Defined

Reactions 3 Comments
4 min read
How cryptography ūüí™works to protect ML models 02:05

How cryptography ūüí™works to protect ML models

Reactions 11 Comments
2 min read
Encryption & decryption for r0@drunner$

Encryption & decryption for r0@drunner$

Reactions 12 Comments
3 min read
JS practice: day1 password generator

JS practice: day1 password generator

Reactions 6 Comments
2 min read
Mina Protocol Debunked

Mina Protocol Debunked

Reactions 5 Comments
10 min read
Verify Webhooks in Ruby on Rails with Public Private Key Crytography

Verify Webhooks in Ruby on Rails with Public Private Key Crytography

Reactions 6 Comments
3 min read
loading...