Forem

# cryptography

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Splitting Secrets Like a Spy: Shamir’s Secret Sharing in Go

Splitting Secrets Like a Spy: Shamir’s Secret Sharing in Go

1
Comments
3 min read
Hashing

Hashing

20
Comments
1 min read
VB .Net: Secure Password

VB .Net: Secure Password

Comments
1 min read
C#: Secure Password

C#: Secure Password

Comments
1 min read
Exploring Quantum Computing: The Next Frontier in Technology (2025)

Exploring Quantum Computing: The Next Frontier in Technology (2025)

2
Comments 1
4 min read
Bitflip Attack on CBC: Change of the Ciphertext

Bitflip Attack on CBC: Change of the Ciphertext

Comments
5 min read
Enhancing Data Security with MongoDB: A Dive into Cryptography and CSFLE at Ovianta
Cover image for Enhancing Data Security with MongoDB: A Dive into Cryptography and CSFLE at Ovianta

Enhancing Data Security with MongoDB: A Dive into Cryptography and CSFLE at Ovianta

Comments
3 min read
Bitflip Attack on CBC: Change of the IV

Bitflip Attack on CBC: Change of the IV

1
Comments
3 min read
What is Post-Quantum Cryptography (PQC) Migration and How to Secure Data Against Quantum Threats

What is Post-Quantum Cryptography (PQC) Migration and How to Secure Data Against Quantum Threats

Comments
3 min read
Introducing Inline Cryptography Toolkit: Simplify Encryption, Decryption, and Hashing in VS Code 🚀
Cover image for Introducing Inline Cryptography Toolkit: Simplify Encryption, Decryption, and Hashing in VS Code 🚀

Introducing Inline Cryptography Toolkit: Simplify Encryption, Decryption, and Hashing in VS Code 🚀

1
Comments
2 min read
Como Habilitar o Provedor Legado no OpenSSL 3.x
Cover image for Como Habilitar o Provedor Legado no OpenSSL 3.x

Como Habilitar o Provedor Legado no OpenSSL 3.x

Comments
2 min read
Implementing HTTP Request and Response Encryption in ASP.NET Core with Custom Attributes

Implementing HTTP Request and Response Encryption in ASP.NET Core with Custom Attributes

Comments 2
4 min read
Lithe Crypt: Simplifying Encryption in PHP Applications

Lithe Crypt: Simplifying Encryption in PHP Applications

3
Comments
2 min read
Use Hardware Security Modules And Browser Integration To Fight Deepfakes

Use Hardware Security Modules And Browser Integration To Fight Deepfakes

Comments
7 min read
Camouflage-Shield: An Image Encryption Application.
Cover image for Camouflage-Shield: An Image Encryption Application.

Camouflage-Shield: An Image Encryption Application.

6
Comments
4 min read
The Ultimate Guide to Choosing the Right Cryptography Algorithm for Your Project

The Ultimate Guide to Choosing the Right Cryptography Algorithm for Your Project

1
Comments
4 min read
A Deep Dive into Cryptographic Random Number Generation: From OpenSSL to Entropy

A Deep Dive into Cryptographic Random Number Generation: From OpenSSL to Entropy

2
Comments
24 min read
Comparing Decentralized Identifiers(DID) Methods
Cover image for Comparing Decentralized Identifiers(DID) Methods

Comparing Decentralized Identifiers(DID) Methods

9
Comments
5 min read
Decentralized Identity Simplified: How to Resolve DIDs Effectively
Cover image for Decentralized Identity Simplified: How to Resolve DIDs Effectively

Decentralized Identity Simplified: How to Resolve DIDs Effectively

3
Comments
3 min read
Key Management for DIDs in Web5: A Beginner’s Guide

Key Management for DIDs in Web5: A Beginner’s Guide

6
Comments
4 min read
Key Management for DIDs: A Beginner's Journey
Cover image for Key Management for DIDs: A Beginner's Journey

Key Management for DIDs: A Beginner's Journey

1
Comments
4 min read
Understanding Web5 and Its Potential
Cover image for Understanding Web5 and Its Potential

Understanding Web5 and Its Potential

17
Comments 7
4 min read
Cryptography in Networking

Cryptography in Networking

1
Comments
9 min read
Day ??? of learning go. Building cli apps

Day ??? of learning go. Building cli apps

Comments
2 min read
GnuPG and Digital Signatures

GnuPG and Digital Signatures

Comments
4 min read
loading...