DEV Community

# cryptography

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain

NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain

16
Comments
4 min read
Should crypto be boring?

Should crypto be boring?

8
Comments
1 min read
Cryptography with Practical Examples in .Net Core

Cryptography with Practical Examples in .Net Core

19
Comments 2
6 min read
(Very) Basic Intro To White-Box Cryptography

(Very) Basic Intro To White-Box Cryptography

28
Comments
3 min read
Introduction To Data Encryption With Python

Introduction To Data Encryption With Python

33
Comments 3
6 min read
Base64 vs Base58 Encoding

Base64 vs Base58 Encoding

7
Comments
3 min read
Playfair Cipher using HTML, CSS, JS

Playfair Cipher using HTML, CSS, JS

4
Comments
1 min read
How To Build JWT’s in Go (Golang)

How To Build JWT’s in Go (Golang)

53
Comments
3 min read
What Is Entropy In Cryptography?

What Is Entropy In Cryptography?

11
Comments 1
3 min read
AES-256 Cipher – Python Cryptography Examples

AES-256 Cipher – Python Cryptography Examples

13
Comments 1
4 min read
Will Banning Cryptography Keep the Country Safe?

Will Banning Cryptography Keep the Country Safe?

12
Comments
3 min read
Hashing Passwords – Python Cryptography Examples

Hashing Passwords – Python Cryptography Examples

38
Comments 1
3 min read
(Very) Basic Intro to Lattices in Cryptography

(Very) Basic Intro to Lattices in Cryptography

37
Comments
4 min read
Why is Exclusive Or (XOR) Important in Cryptography?

Why is Exclusive Or (XOR) Important in Cryptography?

63
Comments 3
2 min read
PGP Subkeys for Keybase

PGP Subkeys for Keybase

3
Comments
3 min read
Managing secrets in CI/CD with AWS Secrets Manager description

Managing secrets in CI/CD with AWS Secrets Manager description

7
Comments
9 min read
CAN Bus Cryptography

CAN Bus Cryptography

8
Comments
11 min read
Cryptography Trends And News Going Into 2020

Cryptography Trends And News Going Into 2020

14
Comments
2 min read
(Very) Basic intro to AES-256 Cipher

(Very) Basic intro to AES-256 Cipher

20
Comments
5 min read
(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)

(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)

51
Comments 2
5 min read
If quantum supremacy solved factoring...

If quantum supremacy solved factoring...

3
Comments 1
1 min read
(Very) Basic Intro To Elliptic Curve Cryptography

(Very) Basic Intro To Elliptic Curve Cryptography

11
Comments
7 min read
(Very) Basic Intro to Key Derivation Functions (Argon2, Scrypt, etc)

(Very) Basic Intro to Key Derivation Functions (Argon2, Scrypt, etc)

6
Comments 2
3 min read
(Very) Basic Shamir’s Secret Sharing

(Very) Basic Shamir’s Secret Sharing

10
Comments
3 min read
Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

8
Comments 3
2 min read
Security and Cryptography Mistakes You Are Probably Doing All The Time

Security and Cryptography Mistakes You Are Probably Doing All The Time

89
Comments 2
6 min read
How to store E2EE keys in the browser

How to store E2EE keys in the browser

7
Comments
4 min read
Why and How: Switch from RSA to ECDSA SSH keys

Why and How: Switch from RSA to ECDSA SSH keys

6
Comments 3
7 min read
Qvault’s Lead Engineer Interviewed on “Running in Production”

Qvault’s Lead Engineer Interviewed on “Running in Production”

5
Comments
1 min read
Julius Caesar's Cryptography

Julius Caesar's Cryptography

4
Comments
1 min read
A glimpse into the challenges of working with Cryptography APIs in NodeJS

A glimpse into the challenges of working with Cryptography APIs in NodeJS

10
Comments
5 min read
How to Process Passwords as a Software Developer

How to Process Passwords as a Software Developer

686
Comments 41
4 min read
Securely sending Emails from static sites with a 3rd party API

Securely sending Emails from static sites with a 3rd party API

7
Comments
5 min read
Message Encryption in JavaScript and PHP

Message Encryption in JavaScript and PHP

80
Comments 5
3 min read
Sodium-Plus: A Positive Cryptography Experience for JavaScript Developers

Sodium-Plus: A Positive Cryptography Experience for JavaScript Developers

45
Comments 1
5 min read
Understanding public/private RSA keys

Understanding public/private RSA keys

53
Comments
4 min read
Use the Web Crypto API to Generate a Public / Private Key Pair for End to End, Asymmetric Cryptography on the Web

Use the Web Crypto API to Generate a Public / Private Key Pair for End to End, Asymmetric Cryptography on the Web

59
Comments
3 min read
Brute-forcing an encrypted message from Enigma using the web worker API

Brute-forcing an encrypted message from Enigma using the web worker API

18
Comments 2
13 min read
4 ways of Symmetric Cryptography in JavaScript / How to AES with JavaScript

4 ways of Symmetric Cryptography in JavaScript / How to AES with JavaScript

56
Comments 9
18 min read
p.1 My attempt at building a Password Manager

p.1 My attempt at building a Password Manager

10
Comments 2
8 min read
Building an Enigma machine with only TypeScript and then use Angular DI system to properly instantiate it

Building an Enigma machine with only TypeScript and then use Angular DI system to properly instantiate it

11
Comments
17 min read
Cloud Misconfigurations and Cryptojacking?

Cloud Misconfigurations and Cryptojacking?

8
Comments
3 min read
Stop with the Obfuscation: Encoding and Encryption are Not the Same

Stop with the Obfuscation: Encoding and Encryption are Not the Same

13
Comments 1
2 min read
So Many Auths!

So Many Auths!

9
Comments
6 min read
Enigma machine, how does the famous encryption device work?

Enigma machine, how does the famous encryption device work?

15
Comments
9 min read
They Who Control Encryption

They Who Control Encryption

18
Comments 5
2 min read
BIP 32 Watch-Only Wallets

BIP 32 Watch-Only Wallets

5
Comments
3 min read
(Very) Basic Intro to the Scrypt Hash

(Very) Basic Intro to the Scrypt Hash

7
Comments
3 min read
Down the Rabbit Hole Debugging Node.js Cipher Support

Down the Rabbit Hole Debugging Node.js Cipher Support

7
Comments 1
7 min read
Future Developments - Decentralized Identity

Future Developments - Decentralized Identity

8
Comments
4 min read
Solving Puzzles to Protect the Cloud: CTO Taher Elgamal on His Role at Salesforce and the Future of Cryptography

Solving Puzzles to Protect the Cloud: CTO Taher Elgamal on His Role at Salesforce and the Future of Cryptography

3
Comments
4 min read
Absolute Security with No Trust

Absolute Security with No Trust

19
Comments 2
5 min read
Waves Technical Review

Waves Technical Review

12
Comments 1
6 min read
GPG-signing your Git commits

GPG-signing your Git commits

22
Comments 1
7 min read
An overview about hash functions: Theory and Security

An overview about hash functions: Theory and Security

6
Comments
6 min read
Creating a blockchain with less 100 code lines

Creating a blockchain with less 100 code lines

10
Comments
3 min read
Caesar Cipher Implementation in Python

Caesar Cipher Implementation in Python

9
Comments
4 min read
Gradual Security Claims

Gradual Security Claims

7
Comments
3 min read
RSA: How Maths will protect us while P!=NP

RSA: How Maths will protect us while P!=NP

42
Comments 1
8 min read
What I learned about cryptography in 3 weeks

What I learned about cryptography in 3 weeks

49
Comments 18
2 min read
loading...