DEV Community

# cryptography

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Asymmetric Cryptography: Signing VS Encrypting

Asymmetric Cryptography: Signing VS Encrypting

2
Comments
4 min read
📱Building reliable mobile app security 09:28

📱Building reliable mobile app security

8
Comments
1 min read
Public key cryptography: RSA keys

Public key cryptography: RSA keys

7
Comments
21 min read
Cyptography for Beginners

Cyptography for Beginners

269
Comments 2
5 min read
RSA & How to Create encryption key?

RSA & How to Create encryption key?

4
Comments
2 min read
Making Sense of Public Key Cryptography

Making Sense of Public Key Cryptography

30
Comments 4
12 min read
Hotel Key Management

Hotel Key Management

5
Comments
2 min read
How to share a secret?

How to share a secret?

58
Comments
4 min read
💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

9
Comments
3 min read
A Practical Guide to the Web Cryptography API

A Practical Guide to the Web Cryptography API

160
Comments 6
5 min read
You don't need blockchain... until you do!

You don't need blockchain... until you do!

3
Comments
3 min read
How get int from base64'd number bytes representation in Go

How get int from base64'd number bytes representation in Go

6
Comments
1 min read
“Big-O Algorithms” Course Released

“Big-O Algorithms” Course Released

13
Comments
2 min read
Cryptography Introduction: Block Ciphers

Cryptography Introduction: Block Ciphers

15
Comments
12 min read
Schneier on Cryptography. 🎤Live Interview

Schneier on Cryptography. 🎤Live Interview

12
Comments
7 min read
How to End-to-End Encrypt in Messages Using Twilio and Virgil Security

How to End-to-End Encrypt in Messages Using Twilio and Virgil Security

4
Comments
7 min read
JWTs: Which Signing Algorithm Should I Use?

JWTs: Which Signing Algorithm Should I Use?

7
Comments 3
10 min read
Bcrypt Step by Step

Bcrypt Step by Step

8
Comments
5 min read
🚀 How to add Themis crypto-library to your app with 1 line of code

🚀 How to add Themis crypto-library to your app with 1 line of code

6
Comments
2 min read
“Practical Cryptography” Course Released

“Practical Cryptography” Course Released

12
Comments
2 min read
Blockchain e Cooperativismo lado a lado

Blockchain e Cooperativismo lado a lado

2
Comments
3 min read
HMAC and MACs – The Inner Workings of JWTs

HMAC and MACs – The Inner Workings of JWTs

7
Comments
4 min read
(Very) Basic Intro to PGP (GPG)

(Very) Basic Intro to PGP (GPG)

7
Comments
4 min read
What is Cryptography?

What is Cryptography?

6
Comments 1
16 min read
Creating Elliptical Curve Keys using OpenSSL

Creating Elliptical Curve Keys using OpenSSL

6
Comments
3 min read
(Part 1) Simplified: Hierarchical Deterministic (HD) Wallets

(Part 1) Simplified: Hierarchical Deterministic (HD) Wallets

7
Comments
7 min read
How Cryptographic Randomness with Entropy Vaguely Works

How Cryptographic Randomness with Entropy Vaguely Works

6
Comments
3 min read
How SHA-2 Works Step-By-Step (SHA-256)

How SHA-2 Works Step-By-Step (SHA-256)

99
Comments 1
9 min read
Understanding SHA256

Understanding SHA256

4
Comments
4 min read
COVID19 Security Best Practices

COVID19 Security Best Practices

3
Comments
2 min read
✨How to Run Secure Search over Encrypted Data

✨How to Run Secure Search over Encrypted Data

12
Comments
4 min read
NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain

NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain

16
Comments
4 min read
Should crypto be boring?

Should crypto be boring?

8
Comments
1 min read
Cryptography with Practical Examples in .Net Core

Cryptography with Practical Examples in .Net Core

31
Comments 2
6 min read
(Very) Basic Intro To White-Box Cryptography

(Very) Basic Intro To White-Box Cryptography

28
Comments
3 min read
Introduction To Data Encryption With Python

Introduction To Data Encryption With Python

33
Comments 3
6 min read
Base64 vs Base58 Encoding

Base64 vs Base58 Encoding

7
Comments
3 min read
Playfair Cipher using HTML, CSS, JS

Playfair Cipher using HTML, CSS, JS

4
Comments
1 min read
How To Build JWT’s in Go (Golang)

How To Build JWT’s in Go (Golang)

53
Comments
3 min read
What Is Entropy In Cryptography?

What Is Entropy In Cryptography?

11
Comments 1
3 min read
AES-256 Cipher – Python Cryptography Examples

AES-256 Cipher – Python Cryptography Examples

15
Comments 1
4 min read
Will Banning Cryptography Keep the Country Safe?

Will Banning Cryptography Keep the Country Safe?

12
Comments
3 min read
Hashing Passwords – Python Cryptography Examples

Hashing Passwords – Python Cryptography Examples

38
Comments 1
3 min read
(Very) Basic Intro to Lattices in Cryptography

(Very) Basic Intro to Lattices in Cryptography

37
Comments
4 min read
Why is Exclusive Or (XOR) Important in Cryptography?

Why is Exclusive Or (XOR) Important in Cryptography?

63
Comments 3
2 min read
PGP Subkeys for Keybase

PGP Subkeys for Keybase

3
Comments
3 min read
Managing secrets in CI/CD with AWS Secrets Manager description

Managing secrets in CI/CD with AWS Secrets Manager description

7
Comments
9 min read
CAN Bus Cryptography

CAN Bus Cryptography

8
Comments
11 min read
Cryptography Trends And News Going Into 2020

Cryptography Trends And News Going Into 2020

14
Comments
2 min read
(Very) Basic intro to AES-256 Cipher

(Very) Basic intro to AES-256 Cipher

20
Comments
5 min read
(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)

(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)

51
Comments 2
5 min read
If quantum supremacy solved factoring...

If quantum supremacy solved factoring...

3
Comments 1
1 min read
(Very) Basic Intro To Elliptic Curve Cryptography

(Very) Basic Intro To Elliptic Curve Cryptography

11
Comments
7 min read
(Very) Basic Intro to Key Derivation Functions (Argon2, Scrypt, etc)

(Very) Basic Intro to Key Derivation Functions (Argon2, Scrypt, etc)

6
Comments 2
3 min read
(Very) Basic Shamir’s Secret Sharing

(Very) Basic Shamir’s Secret Sharing

11
Comments
3 min read
Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

8
Comments 3
2 min read
Security and Cryptography Mistakes You Are Probably Doing All The Time

Security and Cryptography Mistakes You Are Probably Doing All The Time

89
Comments 2
6 min read
How to store E2EE keys in the browser

How to store E2EE keys in the browser

7
Comments
4 min read
Why and How: Switch from RSA to ECDSA SSH keys

Why and How: Switch from RSA to ECDSA SSH keys

6
Comments 3
7 min read
Qvault’s Lead Engineer Interviewed on “Running in Production”

Qvault’s Lead Engineer Interviewed on “Running in Production”

5
Comments
1 min read
loading...