DEV Community

# cryptography

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
100 Languages Speedrun: Episode 30: SageMath

100 Languages Speedrun: Episode 30: SageMath

5
Comments
6 min read
How to build a secure crypto wallet

How to build a secure crypto wallet

9
Comments 4
1 min read
Verifying GPG signatures: history, terms and a how-to guide

Verifying GPG signatures: history, terms and a how-to guide

5
Comments
6 min read
Acra. Features: Data masking

Acra. Features: Data masking

8
Comments
1 min read
SafeCloset, a Secret Safe - Why and how I made it in Rust

SafeCloset, a Secret Safe - Why and how I made it in Rust

14
Comments 3
4 min read
Acra. Features: Searchable encryption

Acra. Features: Searchable encryption

8
Comments
2 min read
Acra. Features: Application-level encryption

Acra. Features: Application-level encryption

8
Comments
3 min read
Say goodbye to passwords: WebAuthn, the foundations

Say goodbye to passwords: WebAuthn, the foundations

8
Comments
5 min read
Caesar Cipher: A Simple Encryption System in PicoLisp

Caesar Cipher: A Simple Encryption System in PicoLisp

5
Comments
7 min read
Brief Dive into Ring Signatures

Brief Dive into Ring Signatures

3
Comments
9 min read
Password Encryption with Hash Function in Python

Password Encryption with Hash Function in Python

7
Comments
2 min read
Brief ETH Wallet Security Guide

Brief ETH Wallet Security Guide

4
Comments
8 min read
Application-Layer Encryption Defined

Application-Layer Encryption Defined

3
Comments
4 min read
How cryptography 💪works to protect ML models 02:05

How cryptography 💪works to protect ML models

11
Comments
2 min read
Encryption & decryption for r0@drunner$

Encryption & decryption for r0@drunner$

12
Comments
3 min read
JS practice: day1 password generator

JS practice: day1 password generator

6
Comments
2 min read
Mina Protocol Debunked

Mina Protocol Debunked

5
Comments
10 min read
Verify Webhooks in Ruby on Rails with Public Private Key Crytography

Verify Webhooks in Ruby on Rails with Public Private Key Crytography

6
Comments
3 min read
Understanding modern cryptography

Understanding modern cryptography

4
Comments
8 min read
Cryptography using python.

Cryptography using python.

5
Comments
3 min read
How to withdraw balance of your email from smart contract using "MOMP Network"

How to withdraw balance of your email from smart contract using "MOMP Network"

3
Comments
2 min read
2FA with FIDO U2F / OTP / HOTP / TOTP

2FA with FIDO U2F / OTP / HOTP / TOTP

6
Comments
5 min read
Generate cryptographically safe passwords with Python in 4 lines of code

Generate cryptographically safe passwords with Python in 4 lines of code

3
Comments
1 min read
What is Cryptography? A Complete Overview

What is Cryptography? A Complete Overview

13
Comments
16 min read
Encoding vs encryption for 📱iOS app devs 00:45

Encoding vs encryption for 📱iOS app devs

22
Comments 1
2 min read
Cryptographic frequency Analysis explained

Cryptographic frequency Analysis explained

2
Comments
2 min read
Generate RSA Keypair Using OpenSSL

Generate RSA Keypair Using OpenSSL

5
Comments
2 min read
How to build a "tamperproof cookie"

How to build a "tamperproof cookie"

3
Comments
5 min read
Cryptography and Ciphers explained

Cryptography and Ciphers explained

6
Comments
4 min read
MasquerBot: A Telegram Bot for true paranoids 01:42

MasquerBot: A Telegram Bot for true paranoids

6
Comments
1 min read
A TelegramBot for true paranoids.

A TelegramBot for true paranoids.

7
Comments
1 min read
JP in da Kyiv, and crypto R&D internship pre-announcement

JP in da Kyiv, and crypto R&D internship pre-announcement

5
Comments
2 min read
So what *is* privacy? (In the context of privacy tech)

So what *is* privacy? (In the context of privacy tech)

5
Comments
6 min read
An introduction to cryptography in distributed ledger technology

An introduction to cryptography in distributed ledger technology

107
Comments 7
4 min read
Intro to the One-Time Pad Cipher

Intro to the One-Time Pad Cipher

5
Comments
5 min read
Feel like a secret agent: Hidden messages in images with steganography 🖼️🕵️‍♀️

Feel like a secret agent: Hidden messages in images with steganography 🖼️🕵️‍♀️

255
Comments 17
5 min read
Crack my code

Crack my code

7
Comments 4
1 min read
Building A Password Manager With React JS, Crypto JS, and Fauna

Building A Password Manager With React JS, Crypto JS, and Fauna

147
Comments 10
26 min read
Understanding keys and addresses in bitcoin

Understanding keys and addresses in bitcoin

3
Comments
6 min read
Authenticating GitOps with U2F keys

Authenticating GitOps with U2F keys

6
Comments
2 min read
A beginners guide to infosec

A beginners guide to infosec

31
Comments
6 min read
How Computers generate random numbers ?

How Computers generate random numbers ?

19
Comments 2
3 min read
Backstage: cryptographic R&D internship at Cossack Labs

Backstage: cryptographic R&D internship at Cossack Labs

12
Comments
5 min read
DSA 101: Hashing & Hash Tables

DSA 101: Hashing & Hash Tables

12
Comments
6 min read
E2EE and privacy in mobile messengers, by @vixentael 02:32

E2EE and privacy in mobile messengers, by @vixentael

9
Comments
1 min read
Cryptography with Python using Fernet

Cryptography with Python using Fernet

9
Comments
2 min read
A quick tour of the Python Secrets module

A quick tour of the Python Secrets module

30
Comments 1
3 min read
ASP.NET Core: CreaciĂłn de Cookies Seguras con IDataProtector

ASP.NET Core: CreaciĂłn de Cookies Seguras con IDataProtector

14
Comments
4 min read
Which encryption control to choose for your app protection, by Anastasiia Voitova 02:28

Which encryption control to choose for your app protection, by Anastasiia Voitova

4
Comments
1 min read
Cryptography for dummies

Cryptography for dummies

4
Comments
1 min read
Introducing the O(1) Cryptography Project

Introducing the O(1) Cryptography Project

4
Comments 2
5 min read
Less obvious parts of security asymmetries, by Eugene Pilyankevich

Less obvious parts of security asymmetries, by Eugene Pilyankevich

6
Comments
2 min read
Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova 03:26

Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova

7
Comments
1 min read
Implementing End to End Encryption in your Cross Platform App

Implementing End to End Encryption in your Cross Platform App

11
Comments
2 min read
Caesar Concatenation

Caesar Concatenation

6
Comments 1
2 min read
Construct the Cypher string based on the given conditions

Construct the Cypher string based on the given conditions

5
Comments
3 min read
Implementing End to End Encryption in your Cross Platform App

Implementing End to End Encryption in your Cross Platform App

15
Comments
5 min read
Holiday readings in cryptography🎄☃️✨

Holiday readings in cryptography🎄☃️✨

6
Comments
2 min read
Application level encryption for software architects: everything you need to know

Application level encryption for software architects: everything you need to know

7
Comments
2 min read
Decoding the beauty of cryptography :

Decoding the beauty of cryptography :

13
Comments
4 min read
loading...