Forem

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
AES-256 Cipher – Python Cryptography Examples

AES-256 Cipher – Python Cryptography Examples

16
Comments 1
4 min read
Will Banning Cryptography Keep the Country Safe?

Will Banning Cryptography Keep the Country Safe?

12
Comments
3 min read
Hashing Passwords – Python Cryptography Examples

Hashing Passwords – Python Cryptography Examples

38
Comments 1
3 min read
(Very) Basic Intro to Lattices in Cryptography

(Very) Basic Intro to Lattices in Cryptography

37
Comments
4 min read
Why is Exclusive Or (XOR) Important in Cryptography?

Why is Exclusive Or (XOR) Important in Cryptography?

63
Comments 3
2 min read
PGP Subkeys for Keybase

PGP Subkeys for Keybase

3
Comments
3 min read
Managing secrets in CI/CD with AWS Secrets Manager description

Managing secrets in CI/CD with AWS Secrets Manager description

7
Comments
9 min read
CAN Bus Cryptography

CAN Bus Cryptography

11
Comments
11 min read
Cryptography Trends And News Going Into 2020

Cryptography Trends And News Going Into 2020

14
Comments
2 min read
(Very) Basic intro to AES-256 Cipher

(Very) Basic intro to AES-256 Cipher

20
Comments
5 min read
(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)

(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)

51
Comments 2
5 min read
If quantum supremacy solved factoring...

If quantum supremacy solved factoring...

3
Comments 1
1 min read
(Very) Basic Intro To Elliptic Curve Cryptography

(Very) Basic Intro To Elliptic Curve Cryptography

11
Comments
7 min read
(Very) Basic Intro to Key Derivation Functions (Argon2, Scrypt, etc)

(Very) Basic Intro to Key Derivation Functions (Argon2, Scrypt, etc)

6
Comments 2
3 min read
(Very) Basic Shamir’s Secret Sharing

(Very) Basic Shamir’s Secret Sharing

11
Comments
3 min read
Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

8
Comments 3
2 min read
Security and Cryptography Mistakes You Are Probably Doing All The Time

Security and Cryptography Mistakes You Are Probably Doing All The Time

89
Comments 2
6 min read
How to store E2EE keys in the browser

How to store E2EE keys in the browser

7
Comments
4 min read
Why and How: Switch from RSA to ECDSA SSH keys
Cover image for Why and How: Switch from RSA to ECDSA SSH keys

Why and How: Switch from RSA to ECDSA SSH keys

6
Comments 3
7 min read
Qvault’s Lead Engineer Interviewed on “Running in Production”

Qvault’s Lead Engineer Interviewed on “Running in Production”

5
Comments
1 min read
Julius Caesar's Cryptography

Julius Caesar's Cryptography

4
Comments
1 min read
A glimpse into the challenges of working with Cryptography APIs in NodeJS

A glimpse into the challenges of working with Cryptography APIs in NodeJS

10
Comments
5 min read
Securely sending Emails from static sites with a 3rd party API

Securely sending Emails from static sites with a 3rd party API

7
Comments
5 min read
Message Encryption in JavaScript and PHP

Message Encryption in JavaScript and PHP

80
Comments 5
3 min read
Sodium-Plus: A Positive Cryptography Experience for JavaScript Developers

Sodium-Plus: A Positive Cryptography Experience for JavaScript Developers

45
Comments 1
5 min read
loading...