Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
Forem
Close
#
cryptography
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Unveiling Bouncy Castle Licence: A Comprehensive Exploration of Open Source Licensing for Cryptographic Libraries
Vitali Sorenko
Vitali Sorenko
Vitali Sorenko
Follow
May 16
Unveiling Bouncy Castle Licence: A Comprehensive Exploration of Open Source Licensing for Cryptographic Libraries
#
bouncycastlelicence
#
cryptography
#
opensourcelicensing
Comments
Add Comment
8 min read
Go & AES-GCM: A Security Deep Dive
Alexander Ertli
Alexander Ertli
Alexander Ertli
Follow
May 15
Go & AES-GCM: A Security Deep Dive
#
go
#
security
#
encryption
#
cryptography
Comments
Add Comment
4 min read
Advances and Challenges in Cryptography and Security: A Synthesis of Recent Research in cs.CR from AI Frontiers
Ali Khan
Ali Khan
Ali Khan
Follow
May 12
Advances and Challenges in Cryptography and Security: A Synthesis of Recent Research in cs.CR from AI Frontiers
#
cryptography
#
security
#
postquantumcryptography
#
federatedlearning
Comments
Add Comment
7 min read
đ Crypto is My guy (for Keeping Secrets)
PanicAtTheKernel
PanicAtTheKernel
PanicAtTheKernel
Follow
May 8
đ Crypto is My guy (for Keeping Secrets)
#
cybersecurity
#
python
#
wireshark
#
cryptography
Comments
Add Comment
2 min read
Encrypting and Decrypting a .txt File Using Pythonâs Cryptography Library | by Faruk Ahmed
Faruk
Faruk
Faruk
Follow
Apr 28
Encrypting and Decrypting a .txt File Using Pythonâs Cryptography Library | by Faruk Ahmed
#
file
#
key
#
cryptography
#
encrypting
Comments
Add Comment
1 min read
Understanding RSA - The Math behind modern encryption
Gokul
Gokul
Gokul
Follow
Apr 19
Understanding RSA - The Math behind modern encryption
#
webdev
#
security
#
cryptography
#
algorithms
Comments
Add Comment
3 min read
Securing Digital Interactions: Understanding RSA Encryption
Rithika R
Rithika R
Rithika R
Follow
Apr 3
Securing Digital Interactions: Understanding RSA Encryption
#
cybersecurity
#
rsa
#
encryption
#
cryptography
Comments
Add Comment
5 min read
3.4 Stronger Security Notions (Introduction to Modern Cryptography Jonathan Katz and Yehuda Lindell)
dima853
dima853
dima853
Follow
May 2
3.4 Stronger Security Notions (Introduction to Modern Cryptography Jonathan Katz and Yehuda Lindell)
#
cryptography
#
c
#
security
#
learning
12
reactions
Comments
1
comment
3 min read
Tecnologias: 5 invençÔes inĂ©ditas â a Nona cria mercados do zero.
adevilson de lima
adevilson de lima
adevilson de lima
Follow
Mar 24
Tecnologias: 5 invençÔes inĂ©ditas â a Nona cria mercados do zero.
#
blockchain
#
ai
#
cryptography
#
communication
Comments
Add Comment
1 min read
Asymmetric Encryption and TLS in Rust
Huakun Shen
Huakun Shen
Huakun Shen
Follow
Mar 13
Asymmetric Encryption and TLS in Rust
#
rust
#
cryptography
Comments
Add Comment
4 min read
Understanding Secure Communication: Encryption, Hashing, and Certificates
Teja Kummarikuntla
Teja Kummarikuntla
Teja Kummarikuntla
Follow
Apr 7
Understanding Secure Communication: Encryption, Hashing, and Certificates
#
security
#
cryptography
#
programming
#
webdev
50
reactions
Comments
Add Comment
3 min read
Secure Data Encryption in JavaScript with CryptoSwiftJS
Suvojit Modak
Suvojit Modak
Suvojit Modak
Follow
Apr 3
Secure Data Encryption in JavaScript with CryptoSwiftJS
#
javascript
#
security
#
cryptography
#
webdev
1
reaction
Comments
Add Comment
2 min read
Generating a Self Signed ECC Certificate and Private Key and Validating the same
hobbyist-programmer-ar
hobbyist-programmer-ar
hobbyist-programmer-ar
Follow
Apr 3
Generating a Self Signed ECC Certificate and Private Key and Validating the same
#
programming
#
beginners
#
ssl
#
cryptography
Comments
Add Comment
3 min read
The Quantum Computing Revolution: Opportunities and Challenges in Cryptography
Brian K Mutai
Brian K Mutai
Brian K Mutai
Follow
Feb 16
The Quantum Computing Revolution: Opportunities and Challenges in Cryptography
#
quantumcomputing
#
cryptography
#
blockchain
Comments
Add Comment
3 min read
How to break stream ciphers with repeating keystreams
Moritz Höppner
Moritz Höppner
Moritz Höppner
Follow
Feb 15
How to break stream ciphers with repeating keystreams
#
security
#
cryptography
Comments
Add Comment
2 min read
Quantum Key Distribution (QKD)âThe Future of Secure Communication
Srinivasa Rao Kolusu
Srinivasa Rao Kolusu
Srinivasa Rao Kolusu
Follow
Feb 12
Quantum Key Distribution (QKD)âThe Future of Secure Communication
#
shorsalgorithm
#
cryptography
#
quantumkeydistribution
#
quantumcomputing
1
reaction
Comments
Add Comment
4 min read
Hardware Entropy: The Hidden Foundation of Modern Cryptography
Geoffrey Kim
Geoffrey Kim
Geoffrey Kim
Follow
Mar 13
Hardware Entropy: The Hidden Foundation of Modern Cryptography
#
cybersecurity
#
cryptography
#
randomnumbergeneration
#
systemsecurity
1
reaction
Comments
Add Comment
5 min read
Passwordless: A Password-Free Future, But What Are the Differences?
Techelopment
Techelopment
Techelopment
Follow
Feb 8
Passwordless: A Password-Free Future, But What Are the Differences?
#
security
#
passwordless
#
cryptography
#
learning
2
reactions
Comments
Add Comment
4 min read
What is Post-Quantum Cryptography? Why Do We Need Post-Quantum Cryptography?
Certera
Certera
Certera
Follow
Jan 29
What is Post-Quantum Cryptography? Why Do We Need Post-Quantum Cryptography?
#
pqc
#
pqcattacks
#
cryptography
Comments
Add Comment
6 min read
Hashing
Nozibul Islam
Nozibul Islam
Nozibul Islam
Follow
Jan 23
Hashing
#
hashing
#
websecurity
#
cryptography
#
backenddevelopment
20
reactions
Comments
Add Comment
1 min read
Post-Quantum Cryptography
Muhammad Ishaque
Muhammad Ishaque
Muhammad Ishaque
Follow
Jan 23
Post-Quantum Cryptography
#
webdev
#
cryptography
#
programming
#
security
Comments
Add Comment
2 min read
Homomorphic Encryption: Unlocking Privacy Without Losing Utility
Enmanuel Reynoso
Enmanuel Reynoso
Enmanuel Reynoso
Follow
Feb 24
Homomorphic Encryption: Unlocking Privacy Without Losing Utility
#
cryptography
#
security
#
cybersecurity
Comments
Add Comment
3 min read
How to truncate CBC ciphertext
Moritz Höppner
Moritz Höppner
Moritz Höppner
Follow
Jan 11
How to truncate CBC ciphertext
#
security
#
cryptography
Comments
Add Comment
8 min read
The Counter Mode - manually!
Moritz Höppner
Moritz Höppner
Moritz Höppner
Follow
Feb 6
The Counter Mode - manually!
#
security
#
cryptography
#
bash
#
shell
Comments
Add Comment
7 min read
Splitting Secrets Like a Spy: Shamirâs Secret Sharing in Go
Siddhesh Khandagale
Siddhesh Khandagale
Siddhesh Khandagale
Follow
Feb 6
Splitting Secrets Like a Spy: Shamirâs Secret Sharing in Go
#
go
#
cryptography
#
shamirsecretsharing
#
security
1
reaction
Comments
Add Comment
3 min read
loading...
We're a blogging-forward open source social network where we learn from one another
Log in
Create account