Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
DEV Community
Close
#
cryptography
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
(Part 1) Simplified: Hierarchical Deterministic (HD) Wallets
Niharika Singh ⛓
Niharika Singh ⛓
Niharika Singh ⛓
Follow
Jul 18 '20
(Part 1) Simplified: Hierarchical Deterministic (HD) Wallets
#
blockchain
#
cryptography
#
tutorial
#
security
7
reactions
Comments
Add Comment
7 min read
How Cryptographic Randomness with Entropy Vaguely Works
Aaron
Aaron
Aaron
Follow
Jul 16 '20
How Cryptographic Randomness with Entropy Vaguely Works
#
javascript
#
cryptography
6
reactions
Comments
Add Comment
3 min read
How SHA-2 Works Step-By-Step (SHA-256)
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jul 8 '20
How SHA-2 Works Step-By-Step (SHA-256)
#
algorithms
#
cryptography
#
hashfunctions
#
security
100
reactions
Comments
1
comment
9 min read
Understanding SHA256
Artur Serra
Artur Serra
Artur Serra
Follow
Jul 8 '20
Understanding SHA256
#
blockchain
#
cryptography
#
security
4
reactions
Comments
Add Comment
4 min read
COVID19 Security Best Practices
Nirenj
Nirenj
Nirenj
Follow
Jun 28 '20
COVID19 Security Best Practices
#
covid19
#
cybersecurity
#
cryptography
#
mobilesecurity
3
reactions
Comments
Add Comment
2 min read
✨How to Run Secure Search over Encrypted Data
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Jun 25 '20
✨How to Run Secure Search over Encrypted Data
#
security
#
cryptography
#
encryption
#
search
13
reactions
Comments
Add Comment
4 min read
NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain
Rafik Naccache
Rafik Naccache
Rafik Naccache
Follow
Jun 21 '20
NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain
#
cryptography
#
authentication
#
blockchain
#
clojure
16
reactions
Comments
Add Comment
4 min read
Should crypto be boring?
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Jun 8 '20
Should crypto be boring?
#
discuss
#
cryptography
#
security
8
reactions
Comments
Add Comment
1 min read
Cryptography with Practical Examples in .Net Core
Paul Ulvinius
Paul Ulvinius
Paul Ulvinius
Follow
for
Stratiteq
Jun 8 '20
Cryptography with Practical Examples in .Net Core
#
csharp
#
cryptography
#
dotnet
34
reactions
Comments
2
comments
6 min read
(Very) Basic Intro To White-Box Cryptography
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Apr 27 '20
(Very) Basic Intro To White-Box Cryptography
#
cryptography
#
security
#
crypto
28
reactions
Comments
Add Comment
3 min read
Introduction To Data Encryption With Python
Sam
Sam
Sam
Follow
Mar 8 '20
Introduction To Data Encryption With Python
#
python
#
cryptography
#
cybersecurity
33
reactions
Comments
3
comments
6 min read
Base64 vs Base58 Encoding
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Mar 3 '20
Base64 vs Base58 Encoding
#
bitcoin
#
cryptography
#
encoding
#
base58
7
reactions
Comments
Add Comment
3 min read
Playfair Cipher using HTML, CSS, JS
Sharad Raj (He/Him)
Sharad Raj (He/Him)
Sharad Raj (He/Him)
Follow
Feb 22 '20
Playfair Cipher using HTML, CSS, JS
#
showdev
#
cryptography
#
webdev
#
computerscience
5
reactions
Comments
Add Comment
1 min read
How To Build JWT’s in Go (Golang)
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Feb 20 '20
How To Build JWT’s in Go (Golang)
#
cryptography
#
education
#
go
#
programming
53
reactions
Comments
Add Comment
3 min read
What Is Entropy In Cryptography?
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Feb 14 '20
What Is Entropy In Cryptography?
#
cryptography
#
education
#
programming
#
security
11
reactions
Comments
1
comment
3 min read
How Do Brute-Force Attackers Know They Found The Key?
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Feb 11 '20
How Do Brute-Force Attackers Know They Found The Key?
#
cryptography
#
security
#
tutorial
#
bruteforce
18
reactions
Comments
2
comments
4 min read
AES-256 Cipher – Python Cryptography Examples
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Feb 6 '20
AES-256 Cipher – Python Cryptography Examples
#
cryptography
#
programming
#
python
#
security
16
reactions
Comments
1
comment
4 min read
Will Banning Cryptography Keep the Country Safe?
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Feb 5 '20
Will Banning Cryptography Keep the Country Safe?
#
cryptography
#
security
#
encryption
#
endtoend
12
reactions
Comments
Add Comment
3 min read
Hashing Passwords – Python Cryptography Examples
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jan 29 '20
Hashing Passwords – Python Cryptography Examples
#
cryptography
#
passwords
#
programming
#
python
38
reactions
Comments
1
comment
3 min read
(Very) Basic Intro to Lattices in Cryptography
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jan 23 '20
(Very) Basic Intro to Lattices in Cryptography
#
bitcoin
#
cryptography
#
programming
#
security
37
reactions
Comments
Add Comment
4 min read
Why is Exclusive Or (XOR) Important in Cryptography?
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jan 18 '20
Why is Exclusive Or (XOR) Important in Cryptography?
#
cryptography
#
go
#
security
#
cipher
63
reactions
Comments
3
comments
2 min read
PGP Subkeys for Keybase
Kaspars Dambis
Kaspars Dambis
Kaspars Dambis
Follow
Jan 16 '20
PGP Subkeys for Keybase
#
cryptography
#
privacy
#
identity
#
encryption
3
reactions
Comments
Add Comment
3 min read
Managing secrets in CI/CD with AWS Secrets Manager description
Francois Falala-Sechet
Francois Falala-Sechet
Francois Falala-Sechet
Follow
Jan 14 '20
Managing secrets in CI/CD with AWS Secrets Manager description
#
aws
#
cryptography
#
ci
#
gitlab
7
reactions
Comments
Add Comment
9 min read
CAN Bus Cryptography
Jeremy Mill
Jeremy Mill
Jeremy Mill
Follow
Jan 8 '20
CAN Bus Cryptography
#
security
#
cybersecurity
#
cryptography
#
embedded
8
reactions
Comments
Add Comment
11 min read
Cryptography Trends And News Going Into 2020
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jan 3 '20
Cryptography Trends And News Going Into 2020
#
cryptography
#
passwords
#
programming
#
security
14
reactions
Comments
Add Comment
2 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account