DEV Community

# cryptography

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Cryptography in Blockchain 🤑 | Symmetric Key Cryptography 🚀🚀 | Part-2

Cryptography in Blockchain 🤑 | Symmetric Key Cryptography 🚀🚀 | Part-2

2
Comments 1
1 min read
Zero Knowledge Proofs

Zero Knowledge Proofs

Comments
5 min read
Passwordless encryption with public key for GitHub

Passwordless encryption with public key for GitHub

5
Comments
10 min read
Secure Coding 101: How to Use Random Function

Secure Coding 101: How to Use Random Function

3
Comments
4 min read
Configuring GPG to sign Git commits

Configuring GPG to sign Git commits

Comments
3 min read
Cryptographically protecting your SPA

Cryptographically protecting your SPA

69
Comments 142
12 min read
Verifying Integrity of Files using NodeJS

Verifying Integrity of Files using NodeJS

33
Comments
3 min read
Breaking and building encryption in NFC digital wallets đź“ł

Breaking and building encryption in NFC digital wallets đź“ł

5
Comments
2 min read
The Elliptic Curve Digital Signature Algorithm ECDSA

The Elliptic Curve Digital Signature Algorithm ECDSA

11
Comments
7 min read
Rotation keys in Golang

Rotation keys in Golang

4
Comments
4 min read
Searchable Symmetric Encryption (SSE) Basic Understanding In Go

Searchable Symmetric Encryption (SSE) Basic Understanding In Go

Comments
4 min read
How To Safely Verify MACs With Go And PHP Examples

How To Safely Verify MACs With Go And PHP Examples

Comments 1
5 min read
Self Signed RSA Certificate with .NET 7

Self Signed RSA Certificate with .NET 7

1
Comments
3 min read
Basic End To End Encryption With Crypto

Basic End To End Encryption With Crypto

16
Comments 2
3 min read
Secret Key Encryption with Go using AES

Secret Key Encryption with Go using AES

44
Comments 7
6 min read
L'algoritmo ECDSA

L'algoritmo ECDSA

2
Comments
6 min read
Costruire una prova di Merkle e verificarla

Costruire una prova di Merkle e verificarla

2
Comments
5 min read
Decoding the Differences Between TLS, SSL, and HTTPS

Decoding the Differences Between TLS, SSL, and HTTPS

3
Comments
6 min read
Blockchain e struttura dei dati

Blockchain e struttura dei dati

1
Comments
6 min read
Verifying Git commits using GPG

Verifying Git commits using GPG

21
Comments 5
3 min read
Blockchain 101 - Public key cryptography

Blockchain 101 - Public key cryptography

3
Comments
4 min read
Quick notes on cryptography for js devs

Quick notes on cryptography for js devs

4
Comments 1
4 min read
How to Play Rock-Paper-Scissors Over the Phone

How to Play Rock-Paper-Scissors Over the Phone

1
Comments
3 min read
How to encrypt data easily when your apps and databases are already running

How to encrypt data easily when your apps and databases are already running

8
Comments
2 min read
Signing XRPL transactions with AWS KMS

Signing XRPL transactions with AWS KMS

12
Comments
5 min read
Subscribe to a new newsletter for security-aware developers!

Subscribe to a new newsletter for security-aware developers!

6
Comments
1 min read
Cryptography basics: breaking repeated-key XOR ciphertext

Cryptography basics: breaking repeated-key XOR ciphertext

23
Comments 2
7 min read
Programming problem: Gematria

Programming problem: Gematria

6
Comments
5 min read
Improving security & cryptography in popular cryptocurrency wallets

Improving security & cryptography in popular cryptocurrency wallets

10
Comments
2 min read
Cyber Apocalypse CTF 2022 Writeup - Down the Rabinhole

Cyber Apocalypse CTF 2022 Writeup - Down the Rabinhole

6
Comments
5 min read
Calling the brute(force) squad

Calling the brute(force) squad

5
Comments
6 min read
Encryption in â›… cloud native apps

Encryption in â›… cloud native apps

12
Comments
3 min read
https

https

6
Comments
4 min read
Essential Cryptography for JavaScript Developers

Essential Cryptography for JavaScript Developers

4
Comments
5 min read
ECDSA in Bitcoin

ECDSA in Bitcoin

6
Comments
2 min read
Acra. Features: Integrate data protection that fits your architecture

Acra. Features: Integrate data protection that fits your architecture

9
Comments 1
2 min read
Public key cryptography: OpenSSH private keys

Public key cryptography: OpenSSH private keys

4
Comments
14 min read
Acra. Features: Security events automation

Acra. Features: Security events automation

9
Comments
2 min read
Acra. Features: Logging, audit logging and crypto-signed audit logs

Acra. Features: Logging, audit logging and crypto-signed audit logs

9
Comments
2 min read
đźš© Insomni'hack 2022 CTF write-up

đźš© Insomni'hack 2022 CTF write-up

9
Comments
11 min read
How I REACTO to Algos: Caesar Decipher

How I REACTO to Algos: Caesar Decipher

5
Comments
8 min read
team up for Bug bounty Hunter

team up for Bug bounty Hunter

6
Comments
1 min read
Acra. Features: Data leakage detection

Acra. Features: Data leakage detection

9
Comments
2 min read
Signatures as Authentication in Web3

Signatures as Authentication in Web3

25
Comments 1
3 min read
How I REACTO to Algos: Caesar Cipher

How I REACTO to Algos: Caesar Cipher

6
Comments
10 min read
Lava lamps securing the Web?🤷‍♂️

Lava lamps securing the Web?🤷‍♂️

5
Comments
1 min read
Acra. Features: Database request firewall

Acra. Features: Database request firewall

5
Comments
2 min read
Randomness and Cryptography

Randomness and Cryptography

4
Comments
5 min read
Exploring đźš©đźš©đźš©red flags in React Native security libraries

Exploring đźš©đźš©đźš©red flags in React Native security libraries

5
Comments
2 min read
CryptoPals Crypto Challenges Using Rust: Implement CBC Mode

CryptoPals Crypto Challenges Using Rust: Implement CBC Mode

3
Comments
3 min read
Acra. Features: Authentication

Acra. Features: Authentication

8
Comments
1 min read
Cryptography: What is the difference between Hashing, Signing and MAC?

Cryptography: What is the difference between Hashing, Signing and MAC?

2
Comments 1
6 min read
Acra. Features: Tokenization

Acra. Features: Tokenization

8
Comments
1 min read
Is random() really random ?

Is random() really random ?

12
Comments 4
4 min read
.NET: Modelo Criptográfico, lo que necesitas saber.

.NET: Modelo Criptográfico, lo que necesitas saber.

13
Comments
10 min read
CryptoPals Crypto Challenges Using Rust: Implement PKCS#7 Padding

CryptoPals Crypto Challenges Using Rust: Implement PKCS#7 Padding

6
Comments
1 min read
CryptoPals Crypto Challenges Using Rust: Detect AES in ECB mode

CryptoPals Crypto Challenges Using Rust: Detect AES in ECB mode

6
Comments
2 min read
CryptoPals Crypto Challenges Using Rust: AES in ECB mode

CryptoPals Crypto Challenges Using Rust: AES in ECB mode

6
Comments 1
3 min read
CryptoPals Crypto Challenges Using Rust: Break repeating-key XOR

CryptoPals Crypto Challenges Using Rust: Break repeating-key XOR

5
Comments
5 min read
CryptoPals Crypto Challenges Using Rust: Implement repeating-key XOR

CryptoPals Crypto Challenges Using Rust: Implement repeating-key XOR

5
Comments
1 min read
loading...