DEV Community

# cryptography

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Construct the Cypher string based on the given conditions

Construct the Cypher string based on the given conditions

5
Comments
3 min read
Implementing End to End Encryption in your Cross Platform App

Implementing End to End Encryption in your Cross Platform App

15
Comments
5 min read
Holiday readings in cryptography🎄☃️✨

Holiday readings in cryptography🎄☃️✨

6
Comments
2 min read
Application level encryption for software architects: everything you need to know

Application level encryption for software architects: everything you need to know

7
Comments
2 min read
Decoding the beauty of cryptography :

Decoding the beauty of cryptography :

14
Comments
4 min read
Asymmetric Cryptography: Signing VS Encrypting

Asymmetric Cryptography: Signing VS Encrypting

2
Comments
4 min read
📱Building reliable mobile app security 09:28

📱Building reliable mobile app security

8
Comments
1 min read
Public key cryptography: RSA keys

Public key cryptography: RSA keys

7
Comments
21 min read
Cyptography for Beginners

Cyptography for Beginners

269
Comments 2
5 min read
RSA & How to Create encryption key?

RSA & How to Create encryption key?

4
Comments
2 min read
Making Sense of Public Key Cryptography

Making Sense of Public Key Cryptography

30
Comments 4
12 min read
Hotel Key Management

Hotel Key Management

5
Comments
2 min read
How to share a secret?

How to share a secret?

58
Comments
4 min read
💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

9
Comments
3 min read
A Practical Guide to the Web Cryptography API

A Practical Guide to the Web Cryptography API

161
Comments 6
5 min read
You don't need blockchain... until you do!

You don't need blockchain... until you do!

3
Comments
3 min read
How get int from base64'd number bytes representation in Go

How get int from base64'd number bytes representation in Go

6
Comments
1 min read
“Big-O Algorithms” Course Released

“Big-O Algorithms” Course Released

13
Comments
2 min read
Cryptography Introduction: Block Ciphers

Cryptography Introduction: Block Ciphers

15
Comments
12 min read
Schneier on Cryptography. 🎤Live Interview

Schneier on Cryptography. 🎤Live Interview

12
Comments
7 min read
How to End-to-End Encrypt in Messages Using Twilio and Virgil Security

How to End-to-End Encrypt in Messages Using Twilio and Virgil Security

4
Comments
7 min read
JWTs: Which Signing Algorithm Should I Use?

JWTs: Which Signing Algorithm Should I Use?

8
Comments 3
10 min read
Bcrypt Step by Step

Bcrypt Step by Step

9
Comments
5 min read
🚀 How to add Themis crypto-library to your app with 1 line of code

🚀 How to add Themis crypto-library to your app with 1 line of code

6
Comments
2 min read
“Practical Cryptography” Course Released

“Practical Cryptography” Course Released

12
Comments
1 min read
Blockchain e Cooperativismo lado a lado

Blockchain e Cooperativismo lado a lado

2
Comments
3 min read
HMAC and MACs – The Inner Workings of JWTs

HMAC and MACs – The Inner Workings of JWTs

7
Comments
4 min read
(Very) Basic Intro to PGP (GPG)

(Very) Basic Intro to PGP (GPG)

7
Comments
4 min read
What is Cryptography?

What is Cryptography?

6
Comments 1
16 min read
Creating Elliptical Curve Keys using OpenSSL

Creating Elliptical Curve Keys using OpenSSL

6
Comments
3 min read
(Part 1) Simplified: Hierarchical Deterministic (HD) Wallets

(Part 1) Simplified: Hierarchical Deterministic (HD) Wallets

7
Comments
7 min read
How Cryptographic Randomness with Entropy Vaguely Works

How Cryptographic Randomness with Entropy Vaguely Works

6
Comments
3 min read
How SHA-2 Works Step-By-Step (SHA-256)

How SHA-2 Works Step-By-Step (SHA-256)

100
Comments 1
9 min read
Understanding SHA256

Understanding SHA256

4
Comments
4 min read
COVID19 Security Best Practices

COVID19 Security Best Practices

3
Comments
2 min read
✨How to Run Secure Search over Encrypted Data

✨How to Run Secure Search over Encrypted Data

12
Comments
4 min read
NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain

NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain

16
Comments
4 min read
Should crypto be boring?

Should crypto be boring?

8
Comments
1 min read
Cryptography with Practical Examples in .Net Core

Cryptography with Practical Examples in .Net Core

32
Comments 2
6 min read
(Very) Basic Intro To White-Box Cryptography

(Very) Basic Intro To White-Box Cryptography

28
Comments
3 min read
Introduction To Data Encryption With Python

Introduction To Data Encryption With Python

33
Comments 3
6 min read
Base64 vs Base58 Encoding

Base64 vs Base58 Encoding

7
Comments
3 min read
Playfair Cipher using HTML, CSS, JS

Playfair Cipher using HTML, CSS, JS

5
Comments
1 min read
How To Build JWT’s in Go (Golang)

How To Build JWT’s in Go (Golang)

53
Comments
3 min read
What Is Entropy In Cryptography?

What Is Entropy In Cryptography?

11
Comments 1
3 min read
How Do Brute-Force Attackers Know They Found The Key?

How Do Brute-Force Attackers Know They Found The Key?

18
Comments 2
4 min read
AES-256 Cipher – Python Cryptography Examples

AES-256 Cipher – Python Cryptography Examples

16
Comments 1
4 min read
Will Banning Cryptography Keep the Country Safe?

Will Banning Cryptography Keep the Country Safe?

12
Comments
3 min read
Hashing Passwords – Python Cryptography Examples

Hashing Passwords – Python Cryptography Examples

38
Comments 1
3 min read
(Very) Basic Intro to Lattices in Cryptography

(Very) Basic Intro to Lattices in Cryptography

37
Comments
4 min read
Why is Exclusive Or (XOR) Important in Cryptography?

Why is Exclusive Or (XOR) Important in Cryptography?

63
Comments 3
2 min read
PGP Subkeys for Keybase

PGP Subkeys for Keybase

3
Comments
3 min read
Managing secrets in CI/CD with AWS Secrets Manager description

Managing secrets in CI/CD with AWS Secrets Manager description

7
Comments
9 min read
CAN Bus Cryptography

CAN Bus Cryptography

8
Comments
11 min read
Cryptography Trends And News Going Into 2020

Cryptography Trends And News Going Into 2020

14
Comments
2 min read
(Very) Basic intro to AES-256 Cipher

(Very) Basic intro to AES-256 Cipher

20
Comments
5 min read
(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)

(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)

51
Comments 2
5 min read
If quantum supremacy solved factoring...

If quantum supremacy solved factoring...

3
Comments 1
1 min read
(Very) Basic Intro To Elliptic Curve Cryptography

(Very) Basic Intro To Elliptic Curve Cryptography

11
Comments
7 min read
(Very) Basic Intro to Key Derivation Functions (Argon2, Scrypt, etc)

(Very) Basic Intro to Key Derivation Functions (Argon2, Scrypt, etc)

6
Comments 2
3 min read
loading...