DEV Community

# cryptography

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to share a secret

How to share a secret

2
Comments 3
6 min read
Some useful OpenSSL command

Some useful OpenSSL command

2
Comments
2 min read
Criptografia #0 - Conceitos essenciais

Criptografia #0 - Conceitos essenciais

5
Comments
9 min read
Solving the CIA Kryptos Code (Part 1)

Solving the CIA Kryptos Code (Part 1)

7
Comments
7 min read
Solving the CIA Kryptos Code (Part 4)

Solving the CIA Kryptos Code (Part 4)

2
Comments
5 min read
Solving the CIA Kryptos Code (Part 3)

Solving the CIA Kryptos Code (Part 3)

2
Comments
10 min read
Solving the CIA Kryptos Code (Part 2)

Solving the CIA Kryptos Code (Part 2)

2
Comments
9 min read
🔐 Using Environment Variables a Little More Securely

🔐 Using Environment Variables a Little More Securely

Comments
3 min read
Encryption Part 4: Hashes

Encryption Part 4: Hashes

Comments
4 min read
Encryption Part 2: Diffie-Hellman & Public Key Cryptography

Encryption Part 2: Diffie-Hellman & Public Key Cryptography

Comments
6 min read
Digital certificates And PKI

Digital certificates And PKI

Comments
5 min read
[Challenge]: Nobody's solved this yet, can you?

[Challenge]: Nobody's solved this yet, can you?

6
Comments 7
1 min read
end-to-end encryption with sveltekit

end-to-end encryption with sveltekit

1
Comments
3 min read
What is Quantum Computer: explained in 5 mins

What is Quantum Computer: explained in 5 mins

Comments
4 min read
Cryptography: The Backbone of Bitcoin Transactions

Cryptography: The Backbone of Bitcoin Transactions

5
Comments
4 min read
Understanding the Vigenère Cipher

Understanding the Vigenère Cipher

4
Comments
6 min read
Hacking the Caesar Cipher

Hacking the Caesar Cipher

4
Comments
7 min read
Cryptography in Blockchain 🤑 | Symmetric Key Cryptography 🚀🚀 | Part-2

Cryptography in Blockchain 🤑 | Symmetric Key Cryptography 🚀🚀 | Part-2

2
Comments 1
1 min read
Zero Knowledge Proofs

Zero Knowledge Proofs

Comments
5 min read
Passwordless encryption with public key for GitHub

Passwordless encryption with public key for GitHub

3
Comments
10 min read
Secure Coding 101: How to Use Random Function

Secure Coding 101: How to Use Random Function

3
Comments
4 min read
Configuring GPG to sign Git commits

Configuring GPG to sign Git commits

Comments
3 min read
Cryptographically protecting your SPA

Cryptographically protecting your SPA

68
Comments 142
12 min read
Verifying Integrity of Files using NodeJS

Verifying Integrity of Files using NodeJS

33
Comments
3 min read
Breaking and building encryption in NFC digital wallets 📳

Breaking and building encryption in NFC digital wallets 📳

4
Comments
2 min read
Self Signed RSA Certificate with .NET 7

Self Signed RSA Certificate with .NET 7

Comments
3 min read
The Elliptic Curve Digital Signature Algorithm ECDSA

The Elliptic Curve Digital Signature Algorithm ECDSA

7
Comments
7 min read
Rotation keys in Golang

Rotation keys in Golang

4
Comments
4 min read
Searchable Symmetric Encryption (SSE) Basic Understanding In Go

Searchable Symmetric Encryption (SSE) Basic Understanding In Go

Comments
4 min read
How To Safely Verify MACs With Go And PHP Examples

How To Safely Verify MACs With Go And PHP Examples

Comments 1
5 min read
Basic End To End Encryption With Crypto

Basic End To End Encryption With Crypto

6
Comments 2
3 min read
Secret Key Encryption with Go using AES

Secret Key Encryption with Go using AES

10
Comments 4
6 min read
L'algoritmo ECDSA

L'algoritmo ECDSA

2
Comments
6 min read
Costruire una prova di Merkle e verificarla

Costruire una prova di Merkle e verificarla

2
Comments
5 min read
Decoding the Differences Between TLS, SSL, and HTTPS

Decoding the Differences Between TLS, SSL, and HTTPS

3
Comments
6 min read
Blockchain e struttura dei dati

Blockchain e struttura dei dati

1
Comments
6 min read
Verifying Git commits using GPG

Verifying Git commits using GPG

21
Comments 5
3 min read
Blockchain 101 - Public key cryptography

Blockchain 101 - Public key cryptography

3
Comments
4 min read
Quick notes on cryptography for js devs

Quick notes on cryptography for js devs

4
Comments
4 min read
Smart contracts: audit ‘em all like a security engineer

Smart contracts: audit ‘em all like a security engineer

5
Comments
2 min read
How to Play Rock-Paper-Scissors Over the Phone

How to Play Rock-Paper-Scissors Over the Phone

1
Comments
3 min read
How to encrypt data easily when your apps and databases are already running

How to encrypt data easily when your apps and databases are already running

7
Comments
2 min read
Signing XRPL transactions with AWS KMS

Signing XRPL transactions with AWS KMS

11
Comments
5 min read
Subscribe to a new newsletter for security-aware developers!

Subscribe to a new newsletter for security-aware developers!

6
Comments
1 min read
Cryptography basics: breaking repeated-key XOR ciphertext

Cryptography basics: breaking repeated-key XOR ciphertext

8
Comments
7 min read
Programming problem: Gematria

Programming problem: Gematria

6
Comments
5 min read
Improving security & cryptography in popular cryptocurrency wallets

Improving security & cryptography in popular cryptocurrency wallets

10
Comments
2 min read
Cyber Apocalypse CTF 2022 Writeup - Down the Rabinhole

Cyber Apocalypse CTF 2022 Writeup - Down the Rabinhole

6
Comments
5 min read
Calling the brute(force) squad

Calling the brute(force) squad

5
Comments
6 min read
Encryption in ⛅ cloud native apps

Encryption in ⛅ cloud native apps

11
Comments
3 min read
https

https

5
Comments
4 min read
Essential Cryptography for JavaScript Developers

Essential Cryptography for JavaScript Developers

4
Comments
5 min read
ECDSA in Bitcoin

ECDSA in Bitcoin

6
Comments
2 min read
Acra. Features: Integrate data protection that fits your architecture

Acra. Features: Integrate data protection that fits your architecture

9
Comments 1
2 min read
Public key cryptography: OpenSSH private keys

Public key cryptography: OpenSSH private keys

4
Comments
14 min read
Acra. Features: Security events automation

Acra. Features: Security events automation

9
Comments
2 min read
Acra. Features: Logging, audit logging and crypto-signed audit logs

Acra. Features: Logging, audit logging and crypto-signed audit logs

9
Comments
2 min read
🚩 Insomni'hack 2022 CTF write-up

🚩 Insomni'hack 2022 CTF write-up

8
Comments
11 min read
How I REACTO to Algos: Caesar Decipher

How I REACTO to Algos: Caesar Decipher

5
Comments
8 min read
team up for Bug bounty Hunter

team up for Bug bounty Hunter

6
Comments
1 min read
loading...