Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
Forem
Close
#
cryptography
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
“Big-O Algorithms” Course Released
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Sep 18 '20
“Big-O Algorithms” Course Released
#
cryptography
#
go
#
languages
#
release
13
reactions
Comments
Add Comment
2 min read
Cryptography Introduction: Block Ciphers
Jscrambler
Jscrambler
Jscrambler
Follow
for
Jscrambler
Sep 14 '20
Cryptography Introduction: Block Ciphers
#
cryptography
#
security
#
algorithms
#
programming
15
reactions
Comments
Add Comment
12 min read
Schneier on Cryptography. 🎤Live Interview
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Sep 10 '20
Schneier on Cryptography. 🎤Live Interview
#
watercooler
#
cryptography
#
security
#
career
12
reactions
Comments
Add Comment
7 min read
How to End-to-End Encrypt in Messages Using Twilio and Virgil Security
Mariia Malitska
Mariia Malitska
Mariia Malitska
Follow
Sep 10 '20
How to End-to-End Encrypt in Messages Using Twilio and Virgil Security
#
twilio
#
cryptography
#
tutorial
#
security
4
reactions
Comments
Add Comment
7 min read
JWTs: Which Signing Algorithm Should I Use?
Scott Brady
Scott Brady
Scott Brady
Follow
Aug 25 '20
JWTs: Which Signing Algorithm Should I Use?
#
jwt
#
security
#
webdev
#
cryptography
9
reactions
Comments
3
comments
10 min read
Bcrypt Step by Step
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Aug 27 '20
Bcrypt Step by Step
#
cryptography
#
go
#
languages
#
security
9
reactions
Comments
Add Comment
5 min read
🚀 How to add Themis crypto-library to your app with 1 line of code
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Aug 17 '20
🚀 How to add Themis crypto-library to your app with 1 line of code
#
tutorial
#
security
#
cryptography
#
programming
6
reactions
Comments
Add Comment
2 min read
“Practical Cryptography” Course Released
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Aug 21 '20
“Practical Cryptography” Course Released
#
cryptography
#
go
#
languages
#
release
12
reactions
Comments
Add Comment
1 min read
Blockchain e Cooperativismo lado a lado
André Rodrigues (Xor)
André Rodrigues (Xor)
André Rodrigues (Xor)
Follow
Aug 9 '20
Blockchain e Cooperativismo lado a lado
#
blockchain
#
cryptography
#
internet
2
reactions
Comments
Add Comment
3 min read
HMAC and MACs – The Inner Workings of JWTs
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Aug 11 '20
HMAC and MACs – The Inner Workings of JWTs
#
cryptography
#
security
#
authentication
7
reactions
Comments
Add Comment
4 min read
(Very) Basic Intro to PGP (GPG)
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jul 31 '20
(Very) Basic Intro to PGP (GPG)
#
cryptography
#
security
#
encryption
7
reactions
Comments
Add Comment
4 min read
What is Cryptography?
sumanbasuli
sumanbasuli
sumanbasuli
Follow
for
Tropyl
Jul 27 '20
What is Cryptography?
#
crypto
#
cryptography
#
devlive
#
tutorial
6
reactions
Comments
1
comment
16 min read
Creating Elliptical Curve Keys using OpenSSL
Scott Brady
Scott Brady
Scott Brady
Follow
Jul 20 '20
Creating Elliptical Curve Keys using OpenSSL
#
openssl
#
ecdsa
#
cryptography
#
security
6
reactions
Comments
Add Comment
3 min read
(Part 1) Simplified: Hierarchical Deterministic (HD) Wallets
Niharika Singh ⛓
Niharika Singh ⛓
Niharika Singh ⛓
Follow
Jul 18 '20
(Part 1) Simplified: Hierarchical Deterministic (HD) Wallets
#
blockchain
#
cryptography
#
tutorial
#
security
7
reactions
Comments
Add Comment
7 min read
How Cryptographic Randomness with Entropy Vaguely Works
Aaron
Aaron
Aaron
Follow
Jul 16 '20
How Cryptographic Randomness with Entropy Vaguely Works
#
javascript
#
cryptography
6
reactions
Comments
Add Comment
3 min read
How SHA-2 Works Step-By-Step (SHA-256)
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Jul 8 '20
How SHA-2 Works Step-By-Step (SHA-256)
#
algorithms
#
cryptography
#
hashfunctions
#
security
101
reactions
Comments
1
comment
9 min read
Understanding SHA256
Artur Serra
Artur Serra
Artur Serra
Follow
Jul 8 '20
Understanding SHA256
#
blockchain
#
cryptography
#
security
4
reactions
Comments
Add Comment
4 min read
COVID19 Security Best Practices
Nirenj
Nirenj
Nirenj
Follow
Jun 28 '20
COVID19 Security Best Practices
#
covid19
#
cybersecurity
#
cryptography
#
mobilesecurity
3
reactions
Comments
Add Comment
2 min read
✨How to Run Secure Search over Encrypted Data
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Jun 25 '20
✨How to Run Secure Search over Encrypted Data
#
security
#
cryptography
#
encryption
#
search
13
reactions
Comments
Add Comment
4 min read
NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain
Rafik Naccache
Rafik Naccache
Rafik Naccache
Follow
Jun 21 '20
NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain
#
cryptography
#
authentication
#
blockchain
#
clojure
16
reactions
Comments
Add Comment
4 min read
Cryptography with Practical Examples in .Net Core
Paul Ulvinius
Paul Ulvinius
Paul Ulvinius
Follow
for
Stratiteq
Jun 8 '20
Cryptography with Practical Examples in .Net Core
#
csharp
#
cryptography
#
dotnet
36
reactions
Comments
3
comments
6 min read
Should crypto be boring?
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Jun 8 '20
Should crypto be boring?
#
discuss
#
cryptography
#
security
8
reactions
Comments
Add Comment
1 min read
(Very) Basic Intro To White-Box Cryptography
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Apr 27 '20
(Very) Basic Intro To White-Box Cryptography
#
cryptography
#
security
#
crypto
28
reactions
Comments
Add Comment
3 min read
Introduction To Data Encryption With Python
Sam
Sam
Sam
Follow
Mar 8 '20
Introduction To Data Encryption With Python
#
python
#
cryptography
#
cybersecurity
33
reactions
Comments
3
comments
6 min read
Base64 vs Base58 Encoding
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Mar 3 '20
Base64 vs Base58 Encoding
#
bitcoin
#
cryptography
#
encoding
#
base58
7
reactions
Comments
Add Comment
3 min read
loading...
We're a blogging-forward open source social network where we learn from one another
Log in
Create account