Forem

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How get int from base64'd number bytes representation in Go

How get int from base64'd number bytes representation in Go

6
Comments
1 min read
“Big-O Algorithms” Course Released

“Big-O Algorithms” Course Released

13
Comments
2 min read
Cryptography Introduction: Block Ciphers
Cover image for Cryptography Introduction: Block Ciphers

Cryptography Introduction: Block Ciphers

15
Comments
12 min read
Schneier on Cryptography. 🎤Live Interview
Cover image for Schneier on Cryptography. 🎤Live Interview

Schneier on Cryptography. 🎤Live Interview

12
Comments
7 min read
How to End-to-End Encrypt in Messages Using Twilio and Virgil Security

How to End-to-End Encrypt in Messages Using Twilio and Virgil Security

4
Comments
7 min read
JWTs: Which Signing Algorithm Should I Use?

JWTs: Which Signing Algorithm Should I Use?

10
Comments 3
10 min read
Bcrypt Step by Step

Bcrypt Step by Step

9
Comments
5 min read
🚀 How to add Themis crypto-library to your app with 1 line of code
Cover image for 🚀 How to add Themis crypto-library to your app with 1 line of code

🚀 How to add Themis crypto-library to your app with 1 line of code

6
Comments
2 min read
“Practical Cryptography” Course Released

“Practical Cryptography” Course Released

12
Comments
1 min read
Blockchain e Cooperativismo lado a lado

Blockchain e Cooperativismo lado a lado

2
Comments
3 min read
HMAC and MACs – The Inner Workings of JWTs

HMAC and MACs – The Inner Workings of JWTs

7
Comments
4 min read
(Very) Basic Intro to PGP (GPG)

(Very) Basic Intro to PGP (GPG)

7
Comments
4 min read
What is Cryptography?
Cover image for What is Cryptography?

What is Cryptography?

6
Comments 1
16 min read
Creating Elliptical Curve Keys using OpenSSL

Creating Elliptical Curve Keys using OpenSSL

6
Comments
3 min read
(Part 1) Simplified: Hierarchical Deterministic (HD) Wallets
Cover image for (Part 1) Simplified: Hierarchical Deterministic (HD) Wallets

(Part 1) Simplified: Hierarchical Deterministic (HD) Wallets

7
Comments
7 min read
How Cryptographic Randomness with Entropy Vaguely Works
Cover image for How Cryptographic Randomness with Entropy Vaguely Works

How Cryptographic Randomness with Entropy Vaguely Works

6
Comments
3 min read
How SHA-2 Works Step-By-Step (SHA-256)

How SHA-2 Works Step-By-Step (SHA-256)

103
Comments 1
9 min read
Understanding SHA256
Cover image for Understanding SHA256

Understanding SHA256

4
Comments
4 min read
COVID19 Security Best Practices

COVID19 Security Best Practices

3
Comments
2 min read
✨How to Run Secure Search over Encrypted Data
Cover image for ✨How to Run Secure Search over Encrypted Data

✨How to Run Secure Search over Encrypted Data

14
Comments
4 min read
NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain
Cover image for NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain

NuID: Trustless Authentication Using Zero-Knowledge Proofs on the Blockchain

16
Comments
4 min read
Cryptography with Practical Examples in .Net Core
Cover image for Cryptography with Practical Examples in .Net Core

Cryptography with Practical Examples in .Net Core

36
Comments 3
6 min read
Should crypto be boring?
Cover image for Should crypto be boring?

Should crypto be boring?

8
Comments
1 min read
(Very) Basic Intro To White-Box Cryptography

(Very) Basic Intro To White-Box Cryptography

28
Comments
3 min read
Introduction To Data Encryption With Python
Cover image for Introduction To Data Encryption With Python

Introduction To Data Encryption With Python

33
Comments 3
6 min read
loading...