DEV Community

# cryptography

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Quantum Computing Revolution: Opportunities and Challenges in Cryptography

The Quantum Computing Revolution: Opportunities and Challenges in Cryptography

Comments
3 min read
How to break stream ciphers with repeating keystreams

How to break stream ciphers with repeating keystreams

Comments
2 min read
Quantum Key Distribution (QKD)—The Future of Secure Communication

Quantum Key Distribution (QKD)—The Future of Secure Communication

1
Comments
4 min read
Passwordless: A Password-Free Future, But What Are the Differences?

Passwordless: A Password-Free Future, But What Are the Differences?

2
Comments
4 min read
What is Post-Quantum Cryptography? Why Do We Need Post-Quantum Cryptography?

What is Post-Quantum Cryptography? Why Do We Need Post-Quantum Cryptography?

Comments
6 min read
Hashing

Hashing

20
Comments
1 min read
Post-Quantum Cryptography

Post-Quantum Cryptography

Comments
2 min read
How to truncate CBC ciphertext

How to truncate CBC ciphertext

Comments
8 min read
Bitflip Attack on CBC: Change of the Ciphertext

Bitflip Attack on CBC: Change of the Ciphertext

Comments
5 min read
The Counter Mode - manually!

The Counter Mode - manually!

Comments
7 min read
Splitting Secrets Like a Spy: Shamir’s Secret Sharing in Go

Splitting Secrets Like a Spy: Shamir’s Secret Sharing in Go

6
Comments
3 min read
Introducing Inline Cryptography Toolkit: Simplify Encryption, Decryption, and Hashing in VS Code 🚀

Introducing Inline Cryptography Toolkit: Simplify Encryption, Decryption, and Hashing in VS Code 🚀

Comments
2 min read
Bitflip Attack on CBC: Change of the IV

Bitflip Attack on CBC: Change of the IV

Comments
3 min read
Exploring Quantum Computing: The Next Frontier in Technology (2025)

Exploring Quantum Computing: The Next Frontier in Technology (2025)

1
Comments 1
4 min read
Como Habilitar o Provedor Legado no OpenSSL 3.x

Como Habilitar o Provedor Legado no OpenSSL 3.x

Comments
2 min read
VB .Net: Secure Password

VB .Net: Secure Password

Comments
1 min read
C#: Secure Password

C#: Secure Password

Comments
1 min read
Enhancing Data Security with MongoDB: A Dive into Cryptography and CSFLE at Ovianta

Enhancing Data Security with MongoDB: A Dive into Cryptography and CSFLE at Ovianta

Comments
3 min read
What is Post-Quantum Cryptography (PQC) Migration and How to Secure Data Against Quantum Threats

What is Post-Quantum Cryptography (PQC) Migration and How to Secure Data Against Quantum Threats

Comments
3 min read
"Behind the Code: How Dark Web Drug Marketplaces Operate and the Developers Who Build Them"

"Behind the Code: How Dark Web Drug Marketplaces Operate and the Developers Who Build Them"

Comments
4 min read
The Ultimate Guide to Choosing the Right Cryptography Algorithm for Your Project

The Ultimate Guide to Choosing the Right Cryptography Algorithm for Your Project

Comments
4 min read
Lithe Crypt: Simplifying Encryption in PHP Applications

Lithe Crypt: Simplifying Encryption in PHP Applications

3
Comments
2 min read
Addressing The Threat of Deepfakes With Authentic Images

Addressing The Threat of Deepfakes With Authentic Images

Comments
8 min read
Camouflage-Shield: An Image Encryption Application.

Camouflage-Shield: An Image Encryption Application.

6
Comments
4 min read
Comparing Decentralized Identifiers(DID) Methods

Comparing Decentralized Identifiers(DID) Methods

9
Comments
5 min read
loading...