DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Enigma machine, how does the famous encryption device work?

Enigma machine, how does the famous encryption device work?

15
Comments
9 min read
They Who Control Encryption

They Who Control Encryption

18
Comments 5
2 min read
BIP 32 Watch-Only Wallets

BIP 32 Watch-Only Wallets

5
Comments
3 min read
(Very) Basic Intro to the Scrypt Hash

(Very) Basic Intro to the Scrypt Hash

7
Comments
3 min read
Down the Rabbit Hole Debugging Node.js Cipher Support

Down the Rabbit Hole Debugging Node.js Cipher Support

7
Comments 1
7 min read
Future Developments - Decentralized Identity

Future Developments - Decentralized Identity

8
Comments
4 min read
Solving Puzzles to Protect the Cloud: CTO Taher Elgamal on His Role at Salesforce and the Future of Cryptography

Solving Puzzles to Protect the Cloud: CTO Taher Elgamal on His Role at Salesforce and the Future of Cryptography

3
Comments
4 min read
Absolute Security with No Trust

Absolute Security with No Trust

19
Comments 2
5 min read
Waves Technical Review

Waves Technical Review

12
Comments 1
6 min read
GPG-signing your Git commits

GPG-signing your Git commits

22
Comments 1
7 min read
An overview about hash functions: Theory and Security

An overview about hash functions: Theory and Security

6
Comments
6 min read
Creating a blockchain with less 100 code lines

Creating a blockchain with less 100 code lines

10
Comments
3 min read
Does it matter how the cryptographic keys stored?

Does it matter how the cryptographic keys stored?

5
Comments 1
1 min read
Caesar Cipher Implementation in Python

Caesar Cipher Implementation in Python

9
Comments
4 min read
RSA: How Maths will protect us while P!=NP

RSA: How Maths will protect us while P!=NP

42
Comments 1
8 min read
What I learned about cryptography in 3 weeks

What I learned about cryptography in 3 weeks

49
Comments 18
2 min read
Stealth Addressing in depth [1/3]

Stealth Addressing in depth [1/3]

9
Comments 1
4 min read
Store Encrypted Files in Google Drive

Store Encrypted Files in Google Drive

31
Comments 3
12 min read
PHP Security: Passwords

PHP Security: Passwords

32
Comments 21
4 min read
Symmetric Encryption Key Storage

Symmetric Encryption Key Storage

15
Comments 1
1 min read
Digital signatures : a gentle introduction

Digital signatures : a gentle introduction

12
Comments
3 min read
Another Round of JWT.io and JWT Debugger Extension Updates

Another Round of JWT.io and JWT Debugger Extension Updates

11
Comments
1 min read
Adding Salt to Hashing: A Better Way to Store Passwords

Adding Salt to Hashing: A Better Way to Store Passwords

9
Comments
1 min read
Hashing Passwords: One-Way Road to Security

Hashing Passwords: One-Way Road to Security

5
Comments
1 min read
Crypto Is Hard

Crypto Is Hard

10
Comments
1 min read
loading...