Skip to content
Navigation menu
Search
Search
Log in
Create account
DEV Community
Close
#
cryptography
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
How to Process Passwords as a Software Developer
Nathilia Pierce
Nathilia Pierce
Nathilia Pierce
Follow
Oct 20 '19
How to Process Passwords as a Software Developer
#
security
#
cryptography
686
reactions
Comments
41
comments
4 min read
Cyptography for Beginners
Artem
Artem
Artem
Follow
Oct 24 '20
Cyptography for Beginners
#
todayilearned
#
cryptography
#
beginners
#
security
269
reactions
Comments
2
comments
5 min read
Feel like a secret agent: Hidden messages in images with steganography 🖼️🕵️♀️
Pascal Thormeier
Pascal Thormeier
Pascal Thormeier
Follow
Jun 19 '21
Feel like a secret agent: Hidden messages in images with steganography 🖼️🕵️♀️
#
javascript
#
tutorial
#
cryptography
#
webdev
255
reactions
Comments
17
comments
5 min read
A Practical Guide to the Web Cryptography API
David R. Myers
David R. Myers
David R. Myers
Follow
Sep 9 '20
A Practical Guide to the Web Cryptography API
#
javascript
#
webdev
#
tutorial
#
cryptography
154
reactions
Comments
6
comments
5 min read
Building A Password Manager With React JS, Crypto JS, and Fauna
Babatunde Koiki
Babatunde Koiki
Babatunde Koiki
Follow
Jun 15 '21
Building A Password Manager With React JS, Crypto JS, and Fauna
#
react
#
fauna
#
webdev
#
cryptography
144
reactions
Comments
10
comments
26 min read
An introduction to cryptography in distributed ledger technology
Waylon Jepsen
Waylon Jepsen
Waylon Jepsen
Follow
Jul 8 '21
An introduction to cryptography in distributed ledger technology
#
security
#
cryptography
#
distributedsystems
#
blockchain
107
reactions
Comments
7
comments
4 min read
How SHA-2 Works Step-By-Step (SHA-256)
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jul 8 '20
How SHA-2 Works Step-By-Step (SHA-256)
#
algorithms
#
cryptography
#
hashfunctions
#
security
92
reactions
Comments
Add Comment
9 min read
Security and Cryptography Mistakes You Are Probably Doing All The Time
Martin Heinz
Martin Heinz
Martin Heinz
Follow
Dec 13 '19
Security and Cryptography Mistakes You Are Probably Doing All The Time
#
security
#
docker
#
cryptography
#
devops
89
reactions
Comments
2
comments
6 min read
Message Encryption in JavaScript and PHP
Scott Arciszewski
Scott Arciszewski
Scott Arciszewski
Follow
for
Paragon Initiative Enterprises
Oct 20 '19
Message Encryption in JavaScript and PHP
#
php
#
javascript
#
node
#
cryptography
80
reactions
Comments
5
comments
3 min read
Cryptographically protecting your SPA
Matheus Adorni Dardenne
Matheus Adorni Dardenne
Matheus Adorni Dardenne
Follow
Mar 17 '23
Cryptographically protecting your SPA
#
cryptography
#
react
#
node
#
rsa
68
reactions
Comments
142
comments
12 min read
Why is Exclusive Or (XOR) Important in Cryptography?
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jan 18 '20
Why is Exclusive Or (XOR) Important in Cryptography?
#
cryptography
#
go
#
security
#
cipher
63
reactions
Comments
3
comments
2 min read
Use the Web Crypto API to Generate a Public / Private Key Pair for End to End, Asymmetric Cryptography on the Web
Jeff Gould
Jeff Gould
Jeff Gould
Follow
Sep 26 '19
Use the Web Crypto API to Generate a Public / Private Key Pair for End to End, Asymmetric Cryptography on the Web
#
javascript
#
cryptography
#
crypto
#
webdev
59
reactions
Comments
Add Comment
3 min read
How to share a secret?
Luka Bubalo
Luka Bubalo
Luka Bubalo
Follow
for
Bornfight
Sep 21 '20
How to share a secret?
#
engineeringmonday
#
security
#
cryptography
#
diffiehellman
58
reactions
Comments
Add Comment
4 min read
4 ways of Symmetric Cryptography in JavaScript / How to AES with JavaScript
Halan Pinheiro
Halan Pinheiro
Halan Pinheiro
Follow
Sep 17 '19
4 ways of Symmetric Cryptography in JavaScript / How to AES with JavaScript
#
cryptography
#
javascript
#
security
56
reactions
Comments
10
comments
18 min read
How To Build JWT’s in Go (Golang)
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Feb 20 '20
How To Build JWT’s in Go (Golang)
#
cryptography
#
education
#
go
#
programming
53
reactions
Comments
Add Comment
3 min read
Understanding public/private RSA keys
Dandy Vica
Dandy Vica
Dandy Vica
Follow
Oct 2 '19
Understanding public/private RSA keys
#
rsa
#
tutorial
#
cryptography
53
reactions
Comments
Add Comment
4 min read
(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)
Lane Wagner
Lane Wagner
Lane Wagner
Follow
for
Boot.dev
Jan 1 '20
(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)
#
bitcoin
#
cryptography
#
passwords
#
programming
51
reactions
Comments
2
comments
5 min read
Sodium-Plus: A Positive Cryptography Experience for JavaScript Developers
Scott Arciszewski
Scott Arciszewski
Scott Arciszewski
Follow
for
Paragon Initiative Enterprises
Oct 7 '19
Sodium-Plus: A Positive Cryptography Experience for JavaScript Developers
#
cryptography
#
security
#
node
#
javascript
45
reactions
Comments
1
comment
5 min read
Is Open-Source Cryptography Really Secure?
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jan 30 '20
Is Open-Source Cryptography Really Secure?
#
cryptography
#
programming
#
security
#
opensource
39
reactions
Comments
Add Comment
3 min read
Hashing Passwords – Python Cryptography Examples
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jan 29 '20
Hashing Passwords – Python Cryptography Examples
#
cryptography
#
passwords
#
programming
#
python
38
reactions
Comments
1
comment
3 min read
(Very) Basic Intro to Lattices in Cryptography
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jan 23 '20
(Very) Basic Intro to Lattices in Cryptography
#
bitcoin
#
cryptography
#
programming
#
security
37
reactions
Comments
Add Comment
4 min read
Verifying Integrity of Files using NodeJS
Orkhan Huseynli
Orkhan Huseynli
Orkhan Huseynli
Follow
Apr 1 '23
Verifying Integrity of Files using NodeJS
#
node
#
javascript
#
cryptography
33
reactions
Comments
Add Comment
3 min read
Introduction To Data Encryption With Python
Sam
Sam
Sam
Follow
Mar 8 '20
Introduction To Data Encryption With Python
#
python
#
cryptography
#
cybersecurity
33
reactions
Comments
3
comments
6 min read
A beginners guide to infosec
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Jun 1 '21
A beginners guide to infosec
#
career
#
beginners
#
security
#
cryptography
30
reactions
Comments
Add Comment
6 min read
Making Sense of Public Key Cryptography
Zach Gollwitzer
Zach Gollwitzer
Zach Gollwitzer
Follow
Oct 18 '20
Making Sense of Public Key Cryptography
#
cryptography
#
crypto
#
cryptocurrency
30
reactions
Comments
4
comments
12 min read
(Very) Basic Intro To White-Box Cryptography
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Apr 27 '20
(Very) Basic Intro To White-Box Cryptography
#
cryptography
#
security
#
crypto
28
reactions
Comments
Add Comment
3 min read
A quick tour of the Python Secrets module
1Blademaster
1Blademaster
1Blademaster
Follow
Apr 4 '21
A quick tour of the Python Secrets module
#
python
#
cryptography
#
computerscience
26
reactions
Comments
1
comment
3 min read
Encoding vs encryption for 📱iOS app devs
00:45
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Sep 7 '21
Encoding vs encryption for 📱iOS app devs
#
swift
#
ios
#
security
#
cryptography
22
reactions
Comments
1
comment
2 min read
Verifying Git commits using GPG
Denis Sinyukov
Denis Sinyukov
Denis Sinyukov
Follow
Jan 1 '23
Verifying Git commits using GPG
#
git
#
cryptography
#
github
#
gpg
21
reactions
Comments
5
comments
3 min read
(Very) Basic intro to AES-256 Cipher
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jan 2 '20
(Very) Basic intro to AES-256 Cipher
#
cryptography
#
passwords
#
programming
#
security
20
reactions
Comments
Add Comment
5 min read
How Computers generate random numbers ?
Devesh Anand Srivastava
Devesh Anand Srivastava
Devesh Anand Srivastava
Follow
May 18 '21
How Computers generate random numbers ?
#
computerscience
#
cryptography
#
algorithms
19
reactions
Comments
2
comments
3 min read
Brute-forcing an encrypted message from Enigma using the web worker API
Maxime
Maxime
Maxime
Follow
Sep 20 '19
Brute-forcing an encrypted message from Enigma using the web worker API
#
cryptography
#
enigma
#
angular
19
reactions
Comments
2
comments
13 min read
Cryptography with Practical Examples in .Net Core
Paul Ulvinius
Paul Ulvinius
Paul Ulvinius
Follow
for
Stratiteq
Jun 8 '20
Cryptography with Practical Examples in .Net Core
#
csharp
#
cryptography
#
dotnet
19
reactions
Comments
2
comments
6 min read
Absolute Security with No Trust
Arash Afshar
Arash Afshar
Arash Afshar
Follow
May 17 '19
Absolute Security with No Trust
#
security
#
cryptography
19
reactions
Comments
2
comments
5 min read
How Do Brute-Force Attackers Know They Found The Key?
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Feb 11 '20
How Do Brute-Force Attackers Know They Found The Key?
#
cryptography
#
security
#
tutorial
#
bruteforce
18
reactions
Comments
2
comments
4 min read
They Who Control Encryption
Lane Wagner
Lane Wagner
Lane Wagner
Follow
for
Boot.dev
Jul 29 '19
They Who Control Encryption
#
cryptography
#
security
18
reactions
Comments
5
comments
2 min read
Signatures as Authentication in Web3
Lara Parvinsmith
Lara Parvinsmith
Lara Parvinsmith
Follow
Mar 22 '22
Signatures as Authentication in Web3
#
ethereum
#
blockchain
#
web3
#
cryptography
16
reactions
Comments
Add Comment
3 min read
NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain
Rafik Naccache
Rafik Naccache
Rafik Naccache
Follow
Jun 21 '20
NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain
#
cryptography
#
authentication
#
blockchain
#
clojure
16
reactions
Comments
Add Comment
4 min read
Enigma machine, how does the famous encryption device work?
Maxime
Maxime
Maxime
Follow
Aug 1 '19
Enigma machine, how does the famous encryption device work?
#
cryptography
#
enigma
15
reactions
Comments
Add Comment
9 min read
Cryptography Introduction: Block Ciphers
Jscrambler
Jscrambler
Jscrambler
Follow
for
Jscrambler
Sep 14 '20
Cryptography Introduction: Block Ciphers
#
cryptography
#
security
#
algorithms
#
programming
15
reactions
Comments
Add Comment
12 min read
SafeCloset, a Secret Safe - Why and how I made it in Rust
Denys Séguret
Denys Séguret
Denys Séguret
Follow
Dec 7 '21
SafeCloset, a Secret Safe - Why and how I made it in Rust
#
showdev
#
rust
#
opensource
#
cryptography
14
reactions
Comments
3
comments
4 min read
Implementing End to End Encryption in your Cross Platform App
Tapajyoti Bose
Tapajyoti Bose
Tapajyoti Bose
Follow
Feb 8 '21
Implementing End to End Encryption in your Cross Platform App
#
security
#
encryption
#
cryptography
#
crossplatform
14
reactions
Comments
Add Comment
5 min read
Cryptography Trends And News Going Into 2020
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jan 3 '20
Cryptography Trends And News Going Into 2020
#
cryptography
#
passwords
#
programming
#
security
14
reactions
Comments
Add Comment
2 min read
AES-256 Cipher – Python Cryptography Examples
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Feb 6 '20
AES-256 Cipher – Python Cryptography Examples
#
cryptography
#
programming
#
python
#
security
13
reactions
Comments
1
comment
4 min read
“Big-O Algorithms” Course Released
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Sep 18 '20
“Big-O Algorithms” Course Released
#
cryptography
#
go
#
languages
#
release
13
reactions
Comments
Add Comment
2 min read
What is Cryptography? A Complete Overview
Lane Wagner
Lane Wagner
Lane Wagner
Follow
for
Boot.dev
Sep 27 '21
What is Cryptography? A Complete Overview
#
cryptography
13
reactions
Comments
Add Comment
16 min read
HMAC and MAC Explained Simply – Building Secure Auth With JWTs
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Dec 12 '19
HMAC and MAC Explained Simply – Building Secure Auth With JWTs
#
cryptography
#
passwords
#
programming
#
security
13
reactions
Comments
Add Comment
1 min read
Stop with the Obfuscation: Encoding and Encryption are Not the Same
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Aug 14 '19
Stop with the Obfuscation: Encoding and Encryption are Not the Same
#
cryptography
#
programming
#
security
#
base64
13
reactions
Comments
1
comment
2 min read
Schneier on Cryptography. 🎤Live Interview
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Sep 10 '20
Schneier on Cryptography. 🎤Live Interview
#
watercooler
#
cryptography
#
security
#
career
12
reactions
Comments
Add Comment
7 min read
Decoding the beauty of cryptography :
Rahul Kumar
Rahul Kumar
Rahul Kumar
Follow
Dec 14 '20
Decoding the beauty of cryptography :
#
cryptography
#
security
#
keyexchange
12
reactions
Comments
Add Comment
4 min read
Encryption & decryption for r0@drunner$
Tharun Shiv
Tharun Shiv
Tharun Shiv
Follow
Oct 24 '21
Encryption & decryption for r0@drunner$
#
cryptography
#
encryption
#
security
#
computerscience
12
reactions
Comments
Add Comment
3 min read
.NET: Modelo Criptográfico, lo que necesitas saber.
Isaac Ojeda
Isaac Ojeda
Isaac Ojeda
Follow
Jan 14 '22
.NET: Modelo Criptográfico, lo que necesitas saber.
#
cryptography
#
dotnet
#
security
#
csharp
12
reactions
Comments
Add Comment
10 min read
Will Banning Cryptography Keep the Country Safe?
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Feb 5 '20
Will Banning Cryptography Keep the Country Safe?
#
cryptography
#
security
#
encryption
#
endtoend
12
reactions
Comments
Add Comment
3 min read
Is random() really random ?
Prakhar Tandon
Prakhar Tandon
Prakhar Tandon
Follow
Jan 15 '22
Is random() really random ?
#
programming
#
cryptography
#
javascript
#
productivity
12
reactions
Comments
4
comments
4 min read
“Practical Cryptography” Course Released
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Aug 21 '20
“Practical Cryptography” Course Released
#
cryptography
#
go
#
languages
#
release
12
reactions
Comments
Add Comment
2 min read
Backstage: cryptographic R&D internship at Cossack Labs
Cossack Labs
Cossack Labs
Cossack Labs
Follow
May 12 '21
Backstage: cryptographic R&D internship at Cossack Labs
#
security
#
cryptography
#
beginners
#
internship
12
reactions
Comments
Add Comment
5 min read
ASP.NET Core: Creación de Cookies Seguras con IDataProtector
Isaac Ojeda
Isaac Ojeda
Isaac Ojeda
Follow
Mar 18 '21
ASP.NET Core: Creación de Cookies Seguras con IDataProtector
#
csharp
#
dotnet
#
cryptography
12
reactions
Comments
Add Comment
4 min read
✨How to Run Secure Search over Encrypted Data
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Jun 25 '20
✨How to Run Secure Search over Encrypted Data
#
security
#
cryptography
#
encryption
#
search
11
reactions
Comments
Add Comment
4 min read
What Is Entropy In Cryptography?
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Feb 14 '20
What Is Entropy In Cryptography?
#
cryptography
#
education
#
programming
#
security
11
reactions
Comments
1
comment
3 min read
Implementing End to End Encryption in your Cross Platform App
Tapajyoti Bose
Tapajyoti Bose
Tapajyoti Bose
Follow
Feb 14 '21
Implementing End to End Encryption in your Cross Platform App
#
security
#
encryption
#
cryptography
#
crossplatform
11
reactions
Comments
Add Comment
2 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account