Forem

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cloud Misconfigurations and Cryptojacking?

Cloud Misconfigurations and Cryptojacking?

8
Comments
3 min read
Stop with the Obfuscation: Encoding and Encryption are Not the Same

Stop with the Obfuscation: Encoding and Encryption are Not the Same

13
Comments 1
2 min read
So Many Auths!

So Many Auths!

9
Comments
6 min read
Securing secret key in Android using Keystore
Cover image for Securing secret key in Android using Keystore

Securing secret key in Android using Keystore

7
Comments
4 min read
Enigma machine, how does the famous encryption device work?
Cover image for Enigma machine, how does the famous encryption device work?

Enigma machine, how does the famous encryption device work?

15
Comments
9 min read
They Who Control Encryption

They Who Control Encryption

18
Comments 5
2 min read
BIP 32 Watch-Only Wallets

BIP 32 Watch-Only Wallets

5
Comments
3 min read
(Very) Basic Intro to the Scrypt Hash

(Very) Basic Intro to the Scrypt Hash

7
Comments
3 min read
Down the Rabbit Hole Debugging Node.js Cipher Support

Down the Rabbit Hole Debugging Node.js Cipher Support

7
Comments 1
7 min read
Future Developments - Decentralized Identity

Future Developments - Decentralized Identity

8
Comments
4 min read
Solving Puzzles to Protect the Cloud: CTO Taher Elgamal on His Role at Salesforce and the Future of Cryptography

Solving Puzzles to Protect the Cloud: CTO Taher Elgamal on His Role at Salesforce and the Future of Cryptography

3
Comments
4 min read
Absolute Security with No Trust

Absolute Security with No Trust

19
Comments 2
5 min read
Waves Technical Review
Cover image for Waves Technical Review

Waves Technical Review

12
Comments 1
6 min read
GPG-signing your Git commits
Cover image for GPG-signing your Git commits

GPG-signing your Git commits

22
Comments 1
7 min read
An overview about hash functions: Theory and Security

An overview about hash functions: Theory and Security

6
Comments
6 min read
Creating a blockchain with less 100 code lines

Creating a blockchain with less 100 code lines

10
Comments
3 min read
Does it matter how the cryptographic keys stored?

Does it matter how the cryptographic keys stored?

5
Comments 1
1 min read
Caesar Cipher Implementation in Python
Cover image for Caesar Cipher Implementation in Python

Caesar Cipher Implementation in Python

9
Comments
4 min read
RSA: How Maths will protect us while P!=NP

RSA: How Maths will protect us while P!=NP

42
Comments 1
8 min read
What I learned about cryptography in 3 weeks
Cover image for What I learned about cryptography in 3 weeks

What I learned about cryptography in 3 weeks

49
Comments 18
2 min read
Stealth Addressing in depth [1/3]

Stealth Addressing in depth [1/3]

9
Comments 1
4 min read
Store Encrypted Files in Google Drive
Cover image for Store Encrypted Files in Google Drive

Store Encrypted Files in Google Drive

31
Comments 3
12 min read
PHP Security: Passwords

PHP Security: Passwords

32
Comments 21
4 min read
Symmetric Encryption Key Storage

Symmetric Encryption Key Storage

15
Comments 1
1 min read
Digital signatures : a gentle introduction

Digital signatures : a gentle introduction

12
Comments
3 min read
loading...