DEV Community

# cryptography

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Secure Coding 101: How to Use Random Function

Secure Coding 101: How to Use Random Function

3
Comments
4 min read
Configuring GPG to sign Git commits

Configuring GPG to sign Git commits

Comments
3 min read
Cryptographically protecting your SPA

Cryptographically protecting your SPA

69
Comments 142
12 min read
Verifying Integrity of Files using NodeJS

Verifying Integrity of Files using NodeJS

34
Comments
3 min read
Breaking and building encryption in NFC digital wallets 📳

Breaking and building encryption in NFC digital wallets 📳

6
Comments
2 min read
The Elliptic Curve Digital Signature Algorithm ECDSA

The Elliptic Curve Digital Signature Algorithm ECDSA

12
Comments
7 min read
Rotation keys in Golang

Rotation keys in Golang

4
Comments
4 min read
Searchable Symmetric Encryption (SSE) Basic Understanding In Go

Searchable Symmetric Encryption (SSE) Basic Understanding In Go

Comments
4 min read
How To Safely Verify MACs With Go And PHP Examples

How To Safely Verify MACs With Go And PHP Examples

Comments 1
5 min read
Self Signed RSA Certificate with .NET 7

Self Signed RSA Certificate with .NET 7

2
Comments
3 min read
Basic End To End Encryption With Crypto

Basic End To End Encryption With Crypto

21
Comments 2
3 min read
L'algoritmo ECDSA

L'algoritmo ECDSA

2
Comments
6 min read
Costruire una prova di Merkle e verificarla

Costruire una prova di Merkle e verificarla

2
Comments
5 min read
It's all good

It's all good

1
Comments
3 min read
Decoding the Differences Between TLS, SSL, and HTTPS

Decoding the Differences Between TLS, SSL, and HTTPS

3
Comments
6 min read
Verifying Git commits using GPG

Verifying Git commits using GPG

21
Comments 5
3 min read
Quick notes on cryptography for js devs

Quick notes on cryptography for js devs

4
Comments 1
4 min read
How to Play Rock-Paper-Scissors Over the Phone

How to Play Rock-Paper-Scissors Over the Phone

2
Comments
3 min read
How to encrypt data easily when your apps and databases are already running

How to encrypt data easily when your apps and databases are already running

8
Comments
2 min read
Signing XRPL transactions with AWS KMS

Signing XRPL transactions with AWS KMS

12
Comments
5 min read
Subscribe to a new newsletter for security-aware developers!

Subscribe to a new newsletter for security-aware developers!

6
Comments
1 min read
Cryptography basics: breaking repeated-key XOR ciphertext

Cryptography basics: breaking repeated-key XOR ciphertext

31
Comments 2
7 min read
Programming problem: Gematria

Programming problem: Gematria

6
Comments
5 min read
Improving security & cryptography in popular cryptocurrency wallets

Improving security & cryptography in popular cryptocurrency wallets

10
Comments
2 min read
Cyber Apocalypse CTF 2022 Writeup - Down the Rabinhole

Cyber Apocalypse CTF 2022 Writeup - Down the Rabinhole

6
Comments
5 min read
loading...