DEV Community

# cryptography

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
JP in da Kyiv, and crypto R&D internship pre-announcement

JP in da Kyiv, and crypto R&D internship pre-announcement

5
Comments
2 min read
So what *is* privacy? (In the context of privacy tech)

So what *is* privacy? (In the context of privacy tech)

5
Comments
6 min read
An introduction to cryptography in distributed ledger technology

An introduction to cryptography in distributed ledger technology

107
Comments 7
4 min read
Intro to the One-Time Pad Cipher

Intro to the One-Time Pad Cipher

5
Comments
5 min read
Feel like a secret agent: Hidden messages in images with steganography 🖼️🕵️‍♀️

Feel like a secret agent: Hidden messages in images with steganography 🖼️🕵️‍♀️

255
Comments 17
5 min read
Crack my code

Crack my code

6
Comments 4
1 min read
Building A Password Manager With React JS, Crypto JS, and Fauna

Building A Password Manager With React JS, Crypto JS, and Fauna

144
Comments 10
26 min read
Understanding keys and addresses in bitcoin

Understanding keys and addresses in bitcoin

4
Comments
6 min read
Authenticating GitOps with U2F keys

Authenticating GitOps with U2F keys

6
Comments
2 min read
A beginners guide to infosec

A beginners guide to infosec

30
Comments
6 min read
How Computers generate random numbers ?

How Computers generate random numbers ?

19
Comments 2
3 min read
Backstage: cryptographic R&D internship at Cossack Labs

Backstage: cryptographic R&D internship at Cossack Labs

12
Comments
5 min read
DSA 101: Hashing & Hash Tables

DSA 101: Hashing & Hash Tables

10
Comments
6 min read
E2EE and privacy in mobile messengers, by @vixentael 02:32

E2EE and privacy in mobile messengers, by @vixentael

9
Comments
1 min read
Cryptography with Python using Fernet

Cryptography with Python using Fernet

9
Comments
2 min read
A quick tour of the Python Secrets module

A quick tour of the Python Secrets module

26
Comments 1
3 min read
ASP.NET Core: Creación de Cookies Seguras con IDataProtector

ASP.NET Core: Creación de Cookies Seguras con IDataProtector

12
Comments
4 min read
Which encryption control to choose for your app protection, by Anastasiia Voitova 02:28

Which encryption control to choose for your app protection, by Anastasiia Voitova

4
Comments
1 min read
Cryptography for dummies

Cryptography for dummies

4
Comments
1 min read
Introducing the O(1) Cryptography Project

Introducing the O(1) Cryptography Project

4
Comments 2
5 min read
Less obvious parts of security asymmetries, by Eugene Pilyankevich

Less obvious parts of security asymmetries, by Eugene Pilyankevich

6
Comments
2 min read
Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova 03:26

Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova

7
Comments
1 min read
Implementing End to End Encryption in your Cross Platform App

Implementing End to End Encryption in your Cross Platform App

11
Comments
2 min read
Caesar Concatenation

Caesar Concatenation

6
Comments 1
2 min read
Construct the Cypher string based on the given conditions

Construct the Cypher string based on the given conditions

5
Comments
3 min read
Implementing End to End Encryption in your Cross Platform App

Implementing End to End Encryption in your Cross Platform App

14
Comments
5 min read
Holiday readings in cryptography🎄☃️✨

Holiday readings in cryptography🎄☃️✨

6
Comments
2 min read
Application level encryption for software architects: everything you need to know

Application level encryption for software architects: everything you need to know

7
Comments
2 min read
Decoding the beauty of cryptography :

Decoding the beauty of cryptography :

12
Comments
4 min read
Asymmetric Cryptography: Signing VS Encrypting

Asymmetric Cryptography: Signing VS Encrypting

2
Comments
4 min read
📱Building reliable mobile app security 09:28

📱Building reliable mobile app security

8
Comments
1 min read
Public key cryptography: RSA keys

Public key cryptography: RSA keys

7
Comments
21 min read
Cyptography for Beginners

Cyptography for Beginners

269
Comments 2
5 min read
Cryptographic Magic in Decentralized Storage

Cryptographic Magic in Decentralized Storage

2
Comments
4 min read
RSA & How to Create encryption key?

RSA & How to Create encryption key?

4
Comments
2 min read
Making Sense of Public Key Cryptography

Making Sense of Public Key Cryptography

30
Comments 4
12 min read
Hotel Key Management

Hotel Key Management

5
Comments
2 min read
How to share a secret?

How to share a secret?

58
Comments
4 min read
💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

9
Comments
3 min read
You don't need blockchain... until you do!

You don't need blockchain... until you do!

3
Comments
3 min read
How get int from base64'd number bytes representation in Go

How get int from base64'd number bytes representation in Go

6
Comments
1 min read
“Big-O Algorithms” Course Released

“Big-O Algorithms” Course Released

13
Comments
2 min read
Cryptography Introduction: Block Ciphers

Cryptography Introduction: Block Ciphers

15
Comments
12 min read
A Practical Guide to the Web Cryptography API

A Practical Guide to the Web Cryptography API

154
Comments 6
5 min read
Schneier on Cryptography. 🎤Live Interview

Schneier on Cryptography. 🎤Live Interview

12
Comments
7 min read
How to End-to-End Encrypt in Messages Using Twilio and Virgil Security

How to End-to-End Encrypt in Messages Using Twilio and Virgil Security

4
Comments
7 min read
JWTs: Which Signing Algorithm Should I Use?

JWTs: Which Signing Algorithm Should I Use?

6
Comments 3
10 min read
Bcrypt Step by Step

Bcrypt Step by Step

8
Comments
5 min read
🚀 How to add Themis crypto-library to your app with 1 line of code

🚀 How to add Themis crypto-library to your app with 1 line of code

6
Comments
2 min read
“Practical Cryptography” Course Released

“Practical Cryptography” Course Released

12
Comments
2 min read
Blockchain e Cooperativismo lado a lado

Blockchain e Cooperativismo lado a lado

2
Comments
3 min read
HMAC and MACs – The Inner Workings of JWTs

HMAC and MACs – The Inner Workings of JWTs

7
Comments
4 min read
(Very) Basic Intro to PGP (GPG)

(Very) Basic Intro to PGP (GPG)

7
Comments
4 min read
What is Cryptography?

What is Cryptography?

6
Comments 1
16 min read
Creating Elliptical Curve Keys using OpenSSL

Creating Elliptical Curve Keys using OpenSSL

6
Comments
3 min read
How Cryptographic Randomness with Entropy Vaguely Works

How Cryptographic Randomness with Entropy Vaguely Works

6
Comments
3 min read
How SHA-2 Works Step-By-Step (SHA-256)

How SHA-2 Works Step-By-Step (SHA-256)

92
Comments
9 min read
Understanding SHA256

Understanding SHA256

4
Comments
4 min read
COVID19 Security Best Practices

COVID19 Security Best Practices

3
Comments
2 min read
✨How to Run Secure Search over Encrypted Data

✨How to Run Secure Search over Encrypted Data

11
Comments
4 min read
loading...