Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Search
Log in
Create account
DEV Community
Close
#
cryptography
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Construct the Cypher string based on the given conditions
Abhijit Tripathy
Abhijit Tripathy
Abhijit Tripathy
Follow
for
eduAlgo
Feb 13 '21
Construct the Cypher string based on the given conditions
#
algorithms
#
cpp
#
cryptography
5
 reactions
Comments
Add Comment
3 min read
Implementing End to End Encryption in your Cross Platform App
Tapajyoti Bose
Tapajyoti Bose
Tapajyoti Bose
Follow
Feb 8 '21
Implementing End to End Encryption in your Cross Platform App
#
security
#
encryption
#
cryptography
#
crossplatform
15
 reactions
Comments
Add Comment
5 min read
Holiday readings in cryptographyđâď¸â¨
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Dec 31 '20
Holiday readings in cryptographyđâď¸â¨
#
watercooler
#
cryptography
#
security
#
cybersecurity
6
 reactions
Comments
Add Comment
2 min read
Application level encryption for software architects: everything you need to know
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Dec 18 '20
Application level encryption for software architects: everything you need to know
#
security
#
encryption
#
cryptography
#
tutorial
7
 reactions
Comments
Add Comment
2 min read
Decoding the beauty of cryptography :
Rahul Kumar
Rahul Kumar
Rahul Kumar
Follow
Dec 14 '20
Decoding the beauty of cryptography :
#
cryptography
#
security
#
keyexchange
14
 reactions
Comments
Add Comment
4 min read
Asymmetric Cryptography: Signing VS Encrypting
Clavin June
Clavin June
Clavin June
Follow
Dec 7 '20
Asymmetric Cryptography: Signing VS Encrypting
#
development
#
go
#
security
#
cryptography
2
 reactions
Comments
Add Comment
4 min read
đąBuilding reliable mobile app security
09:28
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Nov 13 '20
đąBuilding reliable mobile app security
#
security
#
mobile
#
cryptography
#
ios
8
 reactions
Comments
Add Comment
1 min read
Public key cryptography: RSA keys
Leonardo Giordani
Leonardo Giordani
Leonardo Giordani
Follow
Nov 8 '20
Public key cryptography: RSA keys
#
python
#
cryptography
#
ssl
#
security
7
 reactions
Comments
Add Comment
21 min read
Cyptography for Beginners
Artem
Artem
Artem
Follow
Oct 24 '20
Cyptography for Beginners
#
todayilearned
#
cryptography
#
beginners
#
security
269
 reactions
Comments
2
 comments
5 min read
RSA & How to Create encryption key?
Ankur Rohilla
Ankur Rohilla
Ankur Rohilla
Follow
Oct 24 '20
RSA & How to Create encryption key?
#
security
#
rsa
#
cryptography
#
datatransmission
4
 reactions
Comments
Add Comment
2 min read
Making Sense of Public Key Cryptography
Zach Gollwitzer
Zach Gollwitzer
Zach Gollwitzer
Follow
Oct 18 '20
Making Sense of Public Key Cryptography
#
cryptography
#
crypto
#
cryptocurrency
30
 reactions
Comments
4
 comments
12 min read
Hotel Key Management
Gudi Varaprasad
Gudi Varaprasad
Gudi Varaprasad
Follow
Oct 20 '20
Hotel Key Management
#
beginners
#
javascript
#
webdev
#
cryptography
5
 reactions
Comments
Add Comment
2 min read
How to share a secret?
Luka Bubalo
Luka Bubalo
Luka Bubalo
Follow
for
Bornfight
Sep 21 '20
How to share a secret?
#
engineeringmonday
#
security
#
cryptography
#
diffiehellman
58
 reactions
Comments
Add Comment
4 min read
đđđđ Security Logs: Cryptographically Signed Audit Logging for Data Protection
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Sep 16 '20
đđđđ Security Logs: Cryptographically Signed Audit Logging for Data Protection
#
discuss
#
security
#
cryptography
9
 reactions
Comments
Add Comment
3 min read
A Practical Guide to the Web Cryptography API
David R. Myers
David R. Myers
David R. Myers
Follow
Sep 9 '20
A Practical Guide to the Web Cryptography API
#
javascript
#
webdev
#
tutorial
#
cryptography
161
 reactions
Comments
6
 comments
5 min read
You don't need blockchain... until you do!
*instinctools
*instinctools
*instinctools
Follow
Sep 15 '20
You don't need blockchain... until you do!
#
blockchain
#
smartcontract
#
cryptography
#
technology
3
 reactions
Comments
Add Comment
3 min read
How get int from base64'd number bytes representation in Go
Tomasz Giba
Tomasz Giba
Tomasz Giba
Follow
Sep 15 '20
How get int from base64'd number bytes representation in Go
#
go
#
base64
#
cryptography
#
rsa
6
 reactions
Comments
Add Comment
1 min read
âBig-O Algorithmsâ Course Released
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Sep 18 '20
âBig-O Algorithmsâ Course Released
#
cryptography
#
go
#
languages
#
release
13
 reactions
Comments
Add Comment
2 min read
Cryptography Introduction: Block Ciphers
Jscrambler
Jscrambler
Jscrambler
Follow
for
Jscrambler
Sep 14 '20
Cryptography Introduction: Block Ciphers
#
cryptography
#
security
#
algorithms
#
programming
15
 reactions
Comments
Add Comment
12 min read
Schneier on Cryptography. đ¤Live Interview
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Sep 10 '20
Schneier on Cryptography. đ¤Live Interview
#
watercooler
#
cryptography
#
security
#
career
12
 reactions
Comments
Add Comment
7 min read
How to End-to-End Encrypt in Messages Using Twilio and Virgil Security
Mariia Malitska
Mariia Malitska
Mariia Malitska
Follow
Sep 10 '20
How to End-to-End Encrypt in Messages Using Twilio and Virgil Security
#
twilio
#
cryptography
#
tutorial
#
security
4
 reactions
Comments
Add Comment
7 min read
JWTs: Which Signing Algorithm Should I Use?
Scott Brady
Scott Brady
Scott Brady
Follow
Aug 25 '20
JWTs: Which Signing Algorithm Should I Use?
#
jwt
#
security
#
webdev
#
cryptography
8
 reactions
Comments
3
 comments
10 min read
Bcrypt Step by Step
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Aug 27 '20
Bcrypt Step by Step
#
cryptography
#
go
#
languages
#
security
9
 reactions
Comments
Add Comment
5 min read
đ How to add Themis crypto-library to your app with 1 line of code
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Aug 17 '20
đ How to add Themis crypto-library to your app with 1 line of code
#
tutorial
#
security
#
cryptography
#
programming
6
 reactions
Comments
Add Comment
2 min read
âPractical Cryptographyâ Course Released
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Aug 21 '20
âPractical Cryptographyâ Course Released
#
cryptography
#
go
#
languages
#
release
12
 reactions
Comments
Add Comment
1 min read
Blockchain e Cooperativismo lado a lado
AndrĂŠ Rodrigues (Xor)
AndrĂŠ Rodrigues (Xor)
AndrĂŠ Rodrigues (Xor)
Follow
Aug 9 '20
Blockchain e Cooperativismo lado a lado
#
blockchain
#
cryptography
#
internet
2
 reactions
Comments
Add Comment
3 min read
HMAC and MACs â The Inner Workings of JWTs
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Aug 11 '20
HMAC and MACs â The Inner Workings of JWTs
#
cryptography
#
security
#
authentication
7
 reactions
Comments
Add Comment
4 min read
(Very) Basic Intro to PGP (GPG)
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jul 31 '20
(Very) Basic Intro to PGP (GPG)
#
cryptography
#
security
#
encryption
7
 reactions
Comments
Add Comment
4 min read
What is Cryptography?
sumanbasuli
sumanbasuli
sumanbasuli
Follow
for
Tropyl
Jul 27 '20
What is Cryptography?
#
crypto
#
cryptography
#
devlive
#
tutorial
6
 reactions
Comments
1
 comment
16 min read
Creating Elliptical Curve Keys using OpenSSL
Scott Brady
Scott Brady
Scott Brady
Follow
Jul 20 '20
Creating Elliptical Curve Keys using OpenSSL
#
openssl
#
ecdsa
#
cryptography
#
security
6
 reactions
Comments
Add Comment
3 min read
(Part 1) Simplified: Hierarchical Deterministic (HD) Wallets
Niharika Singh â
Niharika Singh â
Niharika Singh â
Follow
Jul 18 '20
(Part 1) Simplified: Hierarchical Deterministic (HD) Wallets
#
blockchain
#
cryptography
#
tutorial
#
security
7
 reactions
Comments
Add Comment
7 min read
How Cryptographic Randomness with Entropy Vaguely Works
Aaron
Aaron
Aaron
Follow
Jul 16 '20
How Cryptographic Randomness with Entropy Vaguely Works
#
javascript
#
cryptography
6
 reactions
Comments
Add Comment
3 min read
How SHA-2 Works Step-By-Step (SHA-256)
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jul 8 '20
How SHA-2 Works Step-By-Step (SHA-256)
#
algorithms
#
cryptography
#
hashfunctions
#
security
100
 reactions
Comments
1
 comment
9 min read
Understanding SHA256
Artur Serra
Artur Serra
Artur Serra
Follow
Jul 8 '20
Understanding SHA256
#
blockchain
#
cryptography
#
security
4
 reactions
Comments
Add Comment
4 min read
COVID19 Security Best Practices
Nirenj
Nirenj
Nirenj
Follow
Jun 28 '20
COVID19 Security Best Practices
#
covid19
#
cybersecurity
#
cryptography
#
mobilesecurity
3
 reactions
Comments
Add Comment
2 min read
â¨How to Run Secure Search over Encrypted Data
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Jun 25 '20
â¨How to Run Secure Search over Encrypted Data
#
security
#
cryptography
#
encryption
#
search
12
 reactions
Comments
Add Comment
4 min read
NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain
Rafik Naccache
Rafik Naccache
Rafik Naccache
Follow
Jun 21 '20
NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain
#
cryptography
#
authentication
#
blockchain
#
clojure
16
 reactions
Comments
Add Comment
4 min read
Should crypto be boring?
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Jun 8 '20
Should crypto be boring?
#
discuss
#
cryptography
#
security
8
 reactions
Comments
Add Comment
1 min read
Cryptography with Practical Examples in .Net Core
Paul Ulvinius
Paul Ulvinius
Paul Ulvinius
Follow
for
Stratiteq
Jun 8 '20
Cryptography with Practical Examples in .Net Core
#
csharp
#
cryptography
#
dotnet
32
 reactions
Comments
2
 comments
6 min read
(Very) Basic Intro To White-Box Cryptography
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Apr 27 '20
(Very) Basic Intro To White-Box Cryptography
#
cryptography
#
security
#
crypto
28
 reactions
Comments
Add Comment
3 min read
Introduction To Data Encryption With Python
Sam
Sam
Sam
Follow
Mar 8 '20
Introduction To Data Encryption With Python
#
python
#
cryptography
#
cybersecurity
33
 reactions
Comments
3
 comments
6 min read
Base64 vs Base58 Encoding
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Mar 3 '20
Base64 vs Base58 Encoding
#
bitcoin
#
cryptography
#
encoding
#
base58
7
 reactions
Comments
Add Comment
3 min read
Playfair Cipher using HTML, CSS, JS
Sharad Raj (He/Him)
Sharad Raj (He/Him)
Sharad Raj (He/Him)
Follow
Feb 22 '20
Playfair Cipher using HTML, CSS, JS
#
showdev
#
cryptography
#
webdev
#
computerscience
5
 reactions
Comments
Add Comment
1 min read
How To Build JWTâs in Go (Golang)
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Feb 20 '20
How To Build JWTâs in Go (Golang)
#
cryptography
#
education
#
go
#
programming
53
 reactions
Comments
Add Comment
3 min read
What Is Entropy In Cryptography?
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Feb 14 '20
What Is Entropy In Cryptography?
#
cryptography
#
education
#
programming
#
security
11
 reactions
Comments
1
 comment
3 min read
How Do Brute-Force Attackers Know They Found The Key?
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Feb 11 '20
How Do Brute-Force Attackers Know They Found The Key?
#
cryptography
#
security
#
tutorial
#
bruteforce
18
 reactions
Comments
2
 comments
4 min read
AES-256 Cipher â Python Cryptography Examples
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Feb 6 '20
AES-256 Cipher â Python Cryptography Examples
#
cryptography
#
programming
#
python
#
security
16
 reactions
Comments
1
 comment
4 min read
Will Banning Cryptography Keep the Country Safe?
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Feb 5 '20
Will Banning Cryptography Keep the Country Safe?
#
cryptography
#
security
#
encryption
#
endtoend
12
 reactions
Comments
Add Comment
3 min read
Hashing Passwords â Python Cryptography Examples
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jan 29 '20
Hashing Passwords â Python Cryptography Examples
#
cryptography
#
passwords
#
programming
#
python
38
 reactions
Comments
1
 comment
3 min read
(Very) Basic Intro to Lattices in Cryptography
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jan 23 '20
(Very) Basic Intro to Lattices in Cryptography
#
bitcoin
#
cryptography
#
programming
#
security
37
 reactions
Comments
Add Comment
4 min read
Why is Exclusive Or (XOR) Important in Cryptography?
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jan 18 '20
Why is Exclusive Or (XOR) Important in Cryptography?
#
cryptography
#
go
#
security
#
cipher
63
 reactions
Comments
3
 comments
2 min read
PGP Subkeys for Keybase
Kaspars Dambis
Kaspars Dambis
Kaspars Dambis
Follow
Jan 16 '20
PGP Subkeys for Keybase
#
cryptography
#
privacy
#
identity
#
encryption
3
 reactions
Comments
Add Comment
3 min read
Managing secrets in CI/CD with AWS Secrets Manager description
Francois Falala-Sechet
Francois Falala-Sechet
Francois Falala-Sechet
Follow
Jan 14 '20
Managing secrets in CI/CD with AWS Secrets Manager description
#
aws
#
cryptography
#
ci
#
gitlab
7
 reactions
Comments
Add Comment
9 min read
CAN Bus Cryptography
Jeremy Mill
Jeremy Mill
Jeremy Mill
Follow
Jan 8 '20
CAN Bus Cryptography
#
security
#
cybersecurity
#
cryptography
#
embedded
8
 reactions
Comments
Add Comment
11 min read
Cryptography Trends And News Going Into 2020
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jan 3 '20
Cryptography Trends And News Going Into 2020
#
cryptography
#
passwords
#
programming
#
security
14
 reactions
Comments
Add Comment
2 min read
(Very) Basic intro to AES-256 Cipher
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jan 2 '20
(Very) Basic intro to AES-256 Cipher
#
cryptography
#
passwords
#
programming
#
security
20
 reactions
Comments
Add Comment
5 min read
(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)
Lane Wagner
Lane Wagner
Lane Wagner
Follow
for
Boot.dev
Jan 1 '20
(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)
#
bitcoin
#
cryptography
#
passwords
#
programming
51
 reactions
Comments
2
 comments
5 min read
If quantum supremacy solved factoring...
bittnkr
bittnkr
bittnkr
Follow
Jan 2 '20
If quantum supremacy solved factoring...
#
security
#
cryptography
#
quantum
#
factorization
3
 reactions
Comments
1
 comment
1 min read
(Very) Basic Intro To Elliptic Curve Cryptography
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Dec 31 '19
(Very) Basic Intro To Elliptic Curve Cryptography
#
bitcoin
#
cryptography
#
passwords
#
programming
11
 reactions
Comments
Add Comment
7 min read
(Very) Basic Intro to Key Derivation Functions (Argon2, Scrypt, etc)
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Dec 30 '19
(Very) Basic Intro to Key Derivation Functions (Argon2, Scrypt, etc)
#
cryptography
#
passwords
#
programming
#
security
6
 reactions
Comments
2
 comments
3 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account