Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
encryption
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
How Equillar Implements AEAD Encryption
Nacho Colomina Torregrosa
Nacho Colomina Torregrosa
Nacho Colomina Torregrosa
Follow
Dec 31 '25
How Equillar Implements AEAD Encryption
#
symfony
#
php
#
encryption
1
 reaction
Comments
Add Comment
7 min read
Qeltrix V3: Asymmetric Key Transport and the Universal Dispatcher Era
Muhammed Shafin P
Muhammed Shafin P
Muhammed Shafin P
Follow
Nov 26 '25
Qeltrix V3: Asymmetric Key Transport and the Universal Dispatcher Era
#
hejhdiss
#
qeltrix
#
filecontainer
#
encryption
5
 reactions
Comments
Add Comment
6 min read
NGINX Technical Practice: Configuration Guide for TCP Layer 4 Port Proxy and mTLS Mutual Encryption Authentication
Tiger Smith
Tiger Smith
Tiger Smith
Follow
Nov 23 '25
NGINX Technical Practice: Configuration Guide for TCP Layer 4 Port Proxy and mTLS Mutual Encryption Authentication
#
nginx
#
tls
#
encryption
Comments
Add Comment
9 min read
Building a "Zero-Knowledge" RSA Tool: Crafting the Ultimate Client-Side Encryption Demo
techno kraft
techno kraft
techno kraft
Follow
Dec 23 '25
Building a "Zero-Knowledge" RSA Tool: Crafting the Ultimate Client-Side Encryption Demo
#
encryption
#
cryptography
#
security
#
privacy
3
 reactions
Comments
3
 comments
1 min read
Matrix vs Signal Protocol: Why We Chose NOT to Federate
Andrii Akishyn
Andrii Akishyn
Andrii Akishyn
Follow
Dec 9 '25
Matrix vs Signal Protocol: Why We Chose NOT to Federate
#
security
#
encryption
#
architecture
#
rust
Comments
Add Comment
3 min read
File Chunking: Why It Matters for Cybersecurity in Modern Applications
Volodymyr
Volodymyr
Volodymyr
Follow
Nov 4 '25
File Chunking: Why It Matters for Cybersecurity in Modern Applications
#
security
#
webrtc
#
encryption
#
p2p
Comments
Add Comment
2 min read
Keeping Your Health Data Out of Court
CrisisCore-Systems
CrisisCore-Systems
CrisisCore-Systems
Follow
Dec 8 '25
Keeping Your Health Data Out of Court
#
encryption
#
security
#
typescript
#
privacy
Comments
Add Comment
5 min read
PyKryptor - open source AxCrypt alternative
Common
Common
Common
Follow
Nov 10 '25
PyKryptor - open source AxCrypt alternative
#
security
#
encryption
#
python
#
opensource
Comments
Add Comment
2 min read
A Better Password Authentication Flow.. hear me out
Iulian Iordache
Iulian Iordache
Iulian Iordache
Follow
Nov 10 '25
A Better Password Authentication Flow.. hear me out
#
authentification
#
backend
#
security
#
encryption
5
 reactions
Comments
Add Comment
8 min read
Oracle Autonomous Database Security: Maintenance, Access Control, and Encryption
Ryan Giggs
Ryan Giggs
Ryan Giggs
Follow
Oct 8 '25
Oracle Autonomous Database Security: Maintenance, Access Control, and Encryption
#
oracleautonomousdatabase
#
databasesecurity
#
encryption
#
accesscontrol
1
 reaction
Comments
Add Comment
8 min read
Go Security Guide: Tokens, SHA1, RSA & AES Encryption
kingyou
kingyou
kingyou
Follow
Nov 12 '25
Go Security Guide: Tokens, SHA1, RSA & AES Encryption
#
go
#
security
#
encryption
#
tutorial
2
 reactions
Comments
Add Comment
4 min read
Tokenization vs. Encryption for Payment Data Security
Demola Malomo
Demola Malomo
Demola Malomo
Follow
for
Flutterwave Engineering
Oct 24 '25
Tokenization vs. Encryption for Payment Data Security
#
fintech
#
tokenization
#
encryption
#
security
10
 reactions
Comments
Add Comment
7 min read
Enigma Machine : How a step on its rotor change the mapping
heavenhunter
heavenhunter
heavenhunter
Follow
Sep 13 '25
Enigma Machine : How a step on its rotor change the mapping
#
cryptography
#
encryption
#
enigma
Comments
Add Comment
2 min read
đ 10 Core Concepts Every Developer Should Know About Data Security
KASRA10
KASRA10
KASRA10
Follow
Oct 15 '25
đ 10 Core Concepts Every Developer Should Know About Data Security
#
cybersecurity
#
encryption
#
digitalsignatures
#
websecurity
2
 reactions
Comments
Add Comment
3 min read
Unlocking AI's Potential: Secure Language Models for Sensitive Data
Arvind Sundara Rajan
Arvind Sundara Rajan
Arvind Sundara Rajan
Follow
Sep 11 '25
Unlocking AI's Potential: Secure Language Models for Sensitive Data
#
ai
#
machinelearning
#
privacy
#
encryption
5
 reactions
Comments
Add Comment
2 min read
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account