DEV Community

# cryptography

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Public key cryptography: OpenSSH private keys

Public key cryptography: OpenSSH private keys

4
Comments
14 min read
Acra. Features: Security events automation

Acra. Features: Security events automation

9
Comments
2 min read
Acra. Features: Logging, audit logging and crypto-signed audit logs

Acra. Features: Logging, audit logging and crypto-signed audit logs

9
Comments
2 min read
đŸš© Insomni'hack 2022 CTF write-up

đŸš© Insomni'hack 2022 CTF write-up

8
Comments
11 min read
How I REACTO to Algos: Caesar Decipher

How I REACTO to Algos: Caesar Decipher

5
Comments
8 min read
team up for Bug bounty Hunter

team up for Bug bounty Hunter

6
Comments
1 min read
Acra. Features: Data leakage detection

Acra. Features: Data leakage detection

9
Comments
2 min read
Signatures as Authentication in Web3

Signatures as Authentication in Web3

16
Comments
3 min read
How I REACTO to Algos: Caesar Cipher

How I REACTO to Algos: Caesar Cipher

6
Comments
10 min read
Lava lamps securing the Web?đŸ€·â€â™‚ïž

Lava lamps securing the Web?đŸ€·â€â™‚ïž

5
Comments
1 min read
Acra. Features: Database request firewall

Acra. Features: Database request firewall

5
Comments
2 min read
Randomness and Cryptography

Randomness and Cryptography

4
Comments
5 min read
Exploring đŸš©đŸš©đŸš©red flags in React Native security libraries

Exploring đŸš©đŸš©đŸš©red flags in React Native security libraries

5
Comments
2 min read
CryptoPals Crypto Challenges Using Rust: Implement CBC Mode

CryptoPals Crypto Challenges Using Rust: Implement CBC Mode

2
Comments
3 min read
Acra. Features: Authentication

Acra. Features: Authentication

8
Comments
1 min read
Cryptography: What is the difference between Hashing, Signing and MAC?

Cryptography: What is the difference between Hashing, Signing and MAC?

1
Comments 1
6 min read
Acra. Features: Tokenization

Acra. Features: Tokenization

8
Comments
1 min read
Is random() really random ?

Is random() really random ?

12
Comments 4
4 min read
.NET: Modelo CriptogrĂĄfico, lo que necesitas saber.

.NET: Modelo CriptogrĂĄfico, lo que necesitas saber.

12
Comments
10 min read
CryptoPals Crypto Challenges Using Rust: Implement PKCS#7 Padding

CryptoPals Crypto Challenges Using Rust: Implement PKCS#7 Padding

6
Comments
1 min read
CryptoPals Crypto Challenges Using Rust: Detect AES in ECB mode

CryptoPals Crypto Challenges Using Rust: Detect AES in ECB mode

6
Comments
2 min read
CryptoPals Crypto Challenges Using Rust: AES in ECB mode

CryptoPals Crypto Challenges Using Rust: AES in ECB mode

6
Comments
3 min read
CryptoPals Crypto Challenges Using Rust: Break repeating-key XOR

CryptoPals Crypto Challenges Using Rust: Break repeating-key XOR

5
Comments
5 min read
CryptoPals Crypto Challenges Using Rust: Implement repeating-key XOR

CryptoPals Crypto Challenges Using Rust: Implement repeating-key XOR

5
Comments
1 min read
CryptoPals Crypto Challenges Using Rust: Detect single-character XOR

CryptoPals Crypto Challenges Using Rust: Detect single-character XOR

6
Comments
2 min read
CryptoPals Crypto Challenges Using Rust: Single-byte xor cipher

CryptoPals Crypto Challenges Using Rust: Single-byte xor cipher

5
Comments
3 min read
CryptoPals Crypto Challenges Using Rust: Fixed XOR

CryptoPals Crypto Challenges Using Rust: Fixed XOR

5
Comments
1 min read
CryptoPals Crypto Challenges Using Rust: Convert hex to base64

CryptoPals Crypto Challenges Using Rust: Convert hex to base64

7
Comments
2 min read
Hashing, Explain it to me like I'm 5.

Hashing, Explain it to me like I'm 5.

4
Comments
1 min read
100 Languages Speedrun: Episode 30: SageMath

100 Languages Speedrun: Episode 30: SageMath

5
Comments
6 min read
How to build a secure crypto wallet

How to build a secure crypto wallet

9
Comments 3
1 min read
Verifying GPG signatures: history, terms and a how-to guide

Verifying GPG signatures: history, terms and a how-to guide

5
Comments
6 min read
Acra. Features: Data masking

Acra. Features: Data masking

8
Comments
1 min read
SafeCloset, a Secret Safe - Why and how I made it in Rust

SafeCloset, a Secret Safe - Why and how I made it in Rust

14
Comments 3
4 min read
Acra. Features: Searchable encryption

Acra. Features: Searchable encryption

8
Comments
2 min read
Acra. Features: Application-level encryption

Acra. Features: Application-level encryption

8
Comments
3 min read
Say goodbye to passwords: WebAuthn, the foundations

Say goodbye to passwords: WebAuthn, the foundations

8
Comments
5 min read
Caesar Cipher: A Simple Encryption System in PicoLisp

Caesar Cipher: A Simple Encryption System in PicoLisp

5
Comments
7 min read
Brief Dive into Ring Signatures

Brief Dive into Ring Signatures

3
Comments
9 min read
Password Encryption with Hash Function in Python

Password Encryption with Hash Function in Python

7
Comments
2 min read
History of Cryptography

History of Cryptography

2
Comments
2 min read
Brief ETH Wallet Security Guide

Brief ETH Wallet Security Guide

4
Comments
8 min read
Application-Layer Encryption Defined

Application-Layer Encryption Defined

3
Comments
4 min read
How cryptography đŸ’Șworks to protect ML models 02:05

How cryptography đŸ’Șworks to protect ML models

9
Comments
2 min read
Encryption & decryption for r0@drunner$

Encryption & decryption for r0@drunner$

12
Comments
3 min read
JS practice: day1 password generator

JS practice: day1 password generator

6
Comments
2 min read
Mina Protocol Debunked

Mina Protocol Debunked

5
Comments
10 min read
Verify Webhooks in Ruby on Rails with Public Private Key Crytography

Verify Webhooks in Ruby on Rails with Public Private Key Crytography

6
Comments
3 min read
Understanding modern cryptography

Understanding modern cryptography

4
Comments
8 min read
Cryptography using python.

Cryptography using python.

5
Comments
3 min read
How to withdraw balance of your email from smart contract using "MOMP Network"

How to withdraw balance of your email from smart contract using "MOMP Network"

3
Comments
2 min read
2FA with FIDO U2F / OTP / HOTP / TOTP

2FA with FIDO U2F / OTP / HOTP / TOTP

6
Comments
5 min read
Generate cryptographically safe passwords with Python in 4 lines of code

Generate cryptographically safe passwords with Python in 4 lines of code

3
Comments
1 min read
What is Cryptography? A Complete Overview

What is Cryptography? A Complete Overview

13
Comments
16 min read
Encoding vs encryption for đŸ“±iOS app devs 00:45

Encoding vs encryption for đŸ“±iOS app devs

22
Comments 1
2 min read
Cryptographic frequency Analysis explained

Cryptographic frequency Analysis explained

2
Comments
2 min read
Generate RSA Keypair Using OpenSSL

Generate RSA Keypair Using OpenSSL

3
Comments
2 min read
How to build a "tamperproof cookie"

How to build a "tamperproof cookie"

3
Comments
5 min read
Cryptography and Ciphers explained

Cryptography and Ciphers explained

6
Comments
4 min read
MasquerBot: A Telegram Bot for true paranoids 01:42

MasquerBot: A Telegram Bot for true paranoids

6
Comments
1 min read
loading...