DEV Community

loading...

# cryptography

👋 Sign in for the ability sort posts by top and latest.
Understanding keys and addresses in bitcoin

Understanding keys and addresses in bitcoin

Reactions 4 Comments
6 min read
Feel like a secret agent: Hidden messages in images with steganography 🖼️🕵️‍♀️

Feel like a secret agent: Hidden messages in images with steganography 🖼️🕵️‍♀️

Reactions 98 Comments 11
5 min read
Building A Password Manager With React JS, Crypto JS, and Fauna

Building A Password Manager With React JS, Crypto JS, and Fauna

Reactions 127 Comments 9
26 min read
Fingerprint-based authentication and Authorization in Python(Django) web applications - Hacking your way out (Part 3)

Fingerprint-based authentication and Authorization in Python(Django) web applications - Hacking your way out (Part 3)

Reactions 4 Comments
4 min read
Authenticating GitOps with U2F keys

Authenticating GitOps with U2F keys

Reactions 6 Comments
2 min read
How Computers generate random numbers ?

How Computers generate random numbers ?

Reactions 17 Comments 2
3 min read
Backstage: cryptographic R&D internship at Cossack Labs

Backstage: cryptographic R&D internship at Cossack Labs

Reactions 14 Comments
5 min read
DSA 101: Hashing & Hash Tables

DSA 101: Hashing & Hash Tables

Reactions 6 Comments
6 min read
Cryptography with Python using Fernet

Cryptography with Python using Fernet

Reactions 6 Comments
2 min read
E2EE and privacy in mobile messengers, by @vixentael 02:32

E2EE and privacy in mobile messengers, by @vixentael

Reactions 10 Comments
1 min read
A quick tour of the Python Secrets module

A quick tour of the Python Secrets module

Reactions 17 Comments
3 min read
ASP.NET Core: Creación de Cookies Seguras con IDataProtector

ASP.NET Core: Creación de Cookies Seguras con IDataProtector

Reactions 8 Comments
4 min read
Which encryption control to choose for your app protection, by Anastasiia Voitova 02:28

Which encryption control to choose for your app protection, by Anastasiia Voitova

Reactions 5 Comments
1 min read
Cryptography for dummies

Cryptography for dummies

Reactions 3 Comments
1 min read
Introducing the O(1) Cryptography Project

Introducing the O(1) Cryptography Project

Reactions 3 Comments 2
5 min read
Less obvious parts of security asymmetries, by Eugene Pilyankevich

Less obvious parts of security asymmetries, by Eugene Pilyankevich

Reactions 5 Comments
2 min read
Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova 03:26

Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova

Reactions 8 Comments
1 min read
Implementing End to End Encryption in your Cross Platform App

Implementing End to End Encryption in your Cross Platform App

Reactions 5 Comments
2 min read
Caesar Concatenation

Caesar Concatenation

Reactions 6 Comments 1
2 min read
Construct the Cypher string based on the given conditions

Construct the Cypher string based on the given conditions

Reactions 5 Comments
3 min read
Implementing End to End Encryption in your Cross Platform App

Implementing End to End Encryption in your Cross Platform App

Reactions 6 Comments
5 min read
Holiday readings in cryptography🎄☃️✨

Holiday readings in cryptography🎄☃️✨

Reactions 8 Comments
2 min read
The Handbook to GPG and Git

The Handbook to GPG and Git

Reactions 19 Comments
12 min read
Application level encryption for software architects: everything you need to know

Application level encryption for software architects: everything you need to know

Reactions 6 Comments
2 min read
Decoding the beauty of cryptography :

Decoding the beauty of cryptography :

Reactions 11 Comments
4 min read
Asymmetric Cryptography: Signing VS Encrypting

Asymmetric Cryptography: Signing VS Encrypting

Reactions 2 Comments
4 min read
RSA & How to Create encryption key?

RSA & How to Create encryption key?

Reactions 4 Comments
2 min read
📱Building reliable mobile app security 09:28

📱Building reliable mobile app security

Reactions 10 Comments
1 min read
Public key cryptography: RSA keys

Public key cryptography: RSA keys

Reactions 6 Comments
21 min read
Cyptography for Beginners

Cyptography for Beginners

Reactions 261 Comments 2
5 min read
Cryptographic Magic in Decentralized Storage

Cryptographic Magic in Decentralized Storage

Reactions 2 Comments
4 min read
Hotel Key Management

Hotel Key Management

Reactions 5 Comments
2 min read
Making Sense of Public Key Cryptography

Making Sense of Public Key Cryptography

Reactions 19 Comments 2
12 min read
How to share a secret?

How to share a secret?

Reactions 58 Comments
4 min read
“Big-O Algorithms” Course Released

“Big-O Algorithms” Course Released

Reactions 13 Comments
2 min read
💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

Reactions 8 Comments
3 min read
You don't need blockchain... until you do!

You don't need blockchain... until you do!

Reactions 3 Comments
3 min read
How get int from base64'd number bytes representation in Go

How get int from base64'd number bytes representation in Go

Reactions 6 Comments
1 min read
Cryptography Introduction: Block Ciphers

Cryptography Introduction: Block Ciphers

Reactions 13 Comments
12 min read
A Practical Guide to the Web Cryptography API

A Practical Guide to the Web Cryptography API

Reactions 153 Comments 6
5 min read
Schneier on Cryptography. 🎤Live Interview

Schneier on Cryptography. 🎤Live Interview

Reactions 14 Comments
7 min read
How to End-to-End Encrypt in Messages Using Twilio and Virgil Security

How to End-to-End Encrypt in Messages Using Twilio and Virgil Security

Reactions 4 Comments
7 min read
Bcrypt Step by Step

Bcrypt Step by Step

Reactions 8 Comments
5 min read
JWTs: Which Signing Algorithm Should I Use?

JWTs: Which Signing Algorithm Should I Use?

Reactions 6 Comments 3
10 min read
“Practical Cryptography” Course Released

“Practical Cryptography” Course Released

Reactions 12 Comments
2 min read
🚀 How to add Themis crypto-library to your app with 1 line of code

🚀 How to add Themis crypto-library to your app with 1 line of code

Reactions 5 Comments
2 min read
HMAC and MACs – The Inner Workings of JWTs

HMAC and MACs – The Inner Workings of JWTs

Reactions 6 Comments
4 min read
Blockchain e Cooperativismo lado a lado

Blockchain e Cooperativismo lado a lado

Reactions 2 Comments
3 min read
(Very) Basic Intro to PGP (GPG)

(Very) Basic Intro to PGP (GPG)

Reactions 6 Comments
4 min read
What is Cryptography?

What is Cryptography?

Reactions 3 Comments 1
16 min read
Creating Elliptical Curve Keys using OpenSSL

Creating Elliptical Curve Keys using OpenSSL

Reactions 6 Comments
3 min read
How Cryptographic Randomness with Entropy Vaguely Works

How Cryptographic Randomness with Entropy Vaguely Works

Reactions 6 Comments
3 min read
How SHA-2 Works Step-By-Step (SHA-256)

How SHA-2 Works Step-By-Step (SHA-256)

Reactions 87 Comments
9 min read
Understanding SHA256

Understanding SHA256

Reactions 4 Comments
4 min read
COVID19 Security Best Practices

COVID19 Security Best Practices

Reactions 3 Comments
2 min read
✨How to Run Secure Search over Encrypted Data

✨How to Run Secure Search over Encrypted Data

Reactions 9 Comments
4 min read
NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain

NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain

Reactions 14 Comments
4 min read
Cryptography with Practical Examples in .Net Core

Cryptography with Practical Examples in .Net Core

Reactions 14 Comments 2
6 min read
(Very) Basic Intro To White-Box Cryptography

(Very) Basic Intro To White-Box Cryptography

Reactions 28 Comments
3 min read
Introduction To Data Encryption With Python

Introduction To Data Encryption With Python

Reactions 31 Comments 3
6 min read
loading...
Forem Open with the Forem app