Forem

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Another Round of JWT.io and JWT Debugger Extension Updates

Another Round of JWT.io and JWT Debugger Extension Updates

11
Comments
1 min read
Adding Salt to Hashing: A Better Way to Store Passwords

Adding Salt to Hashing: A Better Way to Store Passwords

9
Comments
1 min read
Hashing Passwords: One-Way Road to Security

Hashing Passwords: One-Way Road to Security

5
Comments
1 min read
Crypto Is Hard

Crypto Is Hard

10
Comments
1 min read
Blockchain: what is in a block?

Blockchain: what is in a block?

98
Comments 31
5 min read
Java KeyStores—the gory details
Cover image for Java KeyStores—the gory details

Java KeyStores—the gory details

12
Comments 4
7 min read
Fun with secrets

Fun with secrets

28
Comments
3 min read
Supply Chain Attacks and Secure Software Updates

Supply Chain Attacks and Secure Software Updates

15
Comments
6 min read
Learning About Cryptography through Pain

Learning About Cryptography through Pain

2
Comments
7 min read
Achieving Data Integrity Using Cryptography

Achieving Data Integrity Using Cryptography

5
Comments
3 min read
Gradual Security Claims

Gradual Security Claims

7
Comments
3 min read
Secure Machine Learning

Secure Machine Learning

10
Comments
4 min read
Pragmatically Generating a Self-Signed Certificate and Private Key using OpenSSL
Cover image for Pragmatically Generating a Self-Signed Certificate and Private Key using OpenSSL

Pragmatically Generating a Self-Signed Certificate and Private Key using OpenSSL

1
Comments 2
7 min read
Is Open-Source Cryptography Really Secure?

Is Open-Source Cryptography Really Secure?

39
Comments
3 min read
PHP 7.2: The First Programming Language to Add Modern Cryptography to its Standard Library

PHP 7.2: The First Programming Language to Add Modern Cryptography to its Standard Library

13
Comments 16
1 min read
Auto-mounting encrypted drives with a remote key on Linux

Auto-mounting encrypted drives with a remote key on Linux

6
Comments
8 min read
Using cryptography to protect PII in GDPR protected jurisdictions

Using cryptography to protect PII in GDPR protected jurisdictions

10
Comments 1
13 min read
How to Create a Bitcoin Savings Wallet Using Qvault and Sentinel

How to Create a Bitcoin Savings Wallet Using Qvault and Sentinel

6
Comments
4 min read
SECURE COMMS FOR P2P NETWORKS

SECURE COMMS FOR P2P NETWORKS

4
Comments
3 min read
Dual Encryption

Dual Encryption

3
Comments
2 min read
Radix building blocks - File notarization (live)

Radix building blocks - File notarization (live)

3
Comments
4 min read
MPC Part 1: Oblivious Transfer

MPC Part 1: Oblivious Transfer

8
Comments 3
8 min read
Euler, Fermat and Primality Test

Euler, Fermat and Primality Test

4
Comments
2 min read
Toying with Cryptography: Crib Dragging

Toying with Cryptography: Crib Dragging

6
Comments
9 min read
Open the Envelope: How transform encryption works with envelope encryption.

Open the Envelope: How transform encryption works with envelope encryption.

9
Comments
2 min read
loading...