Forem

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Bitflip Attack on CBC: Change of the Ciphertext

Bitflip Attack on CBC: Change of the Ciphertext

Comments
5 min read
Enhancing Data Security with MongoDB: A Dive into Cryptography and CSFLE at Ovianta
Cover image for Enhancing Data Security with MongoDB: A Dive into Cryptography and CSFLE at Ovianta

Enhancing Data Security with MongoDB: A Dive into Cryptography and CSFLE at Ovianta

Comments
3 min read
Bitflip Attack on CBC: Change of the IV

Bitflip Attack on CBC: Change of the IV

1
Comments
3 min read
What is Post-Quantum Cryptography (PQC) Migration and How to Secure Data Against Quantum Threats

What is Post-Quantum Cryptography (PQC) Migration and How to Secure Data Against Quantum Threats

Comments
3 min read
Introducing Inline Cryptography Toolkit: Simplify Encryption, Decryption, and Hashing in VS Code 🚀
Cover image for Introducing Inline Cryptography Toolkit: Simplify Encryption, Decryption, and Hashing in VS Code 🚀

Introducing Inline Cryptography Toolkit: Simplify Encryption, Decryption, and Hashing in VS Code 🚀

1
Comments
2 min read
Como Habilitar o Provedor Legado no OpenSSL 3.x
Cover image for Como Habilitar o Provedor Legado no OpenSSL 3.x

Como Habilitar o Provedor Legado no OpenSSL 3.x

Comments
2 min read
Implementing HTTP Request and Response Encryption in ASP.NET Core with Custom Attributes

Implementing HTTP Request and Response Encryption in ASP.NET Core with Custom Attributes

1
Comments 2
4 min read
Lithe Crypt: Simplifying Encryption in PHP Applications

Lithe Crypt: Simplifying Encryption in PHP Applications

3
Comments
2 min read
Use Hardware Security Modules And Browser Integration To Fight Deepfakes

Use Hardware Security Modules And Browser Integration To Fight Deepfakes

Comments
7 min read
Camouflage-Shield: An Image Encryption Application.
Cover image for Camouflage-Shield: An Image Encryption Application.

Camouflage-Shield: An Image Encryption Application.

6
Comments
4 min read
The Ultimate Guide to Choosing the Right Cryptography Algorithm for Your Project

The Ultimate Guide to Choosing the Right Cryptography Algorithm for Your Project

1
Comments
4 min read
A Deep Dive into Cryptographic Random Number Generation: From OpenSSL to Entropy

A Deep Dive into Cryptographic Random Number Generation: From OpenSSL to Entropy

3
Comments
24 min read
Comparing Decentralized Identifiers(DID) Methods
Cover image for Comparing Decentralized Identifiers(DID) Methods

Comparing Decentralized Identifiers(DID) Methods

9
Comments
5 min read
Decentralized Identity Simplified: How to Resolve DIDs Effectively
Cover image for Decentralized Identity Simplified: How to Resolve DIDs Effectively

Decentralized Identity Simplified: How to Resolve DIDs Effectively

3
Comments
3 min read
Key Management for DIDs in Web5: A Beginner’s Guide

Key Management for DIDs in Web5: A Beginner’s Guide

6
Comments
4 min read
Key Management for DIDs: A Beginner's Journey
Cover image for Key Management for DIDs: A Beginner's Journey

Key Management for DIDs: A Beginner's Journey

1
Comments
4 min read
Understanding Web5 and Its Potential
Cover image for Understanding Web5 and Its Potential

Understanding Web5 and Its Potential

17
Comments 7
4 min read
Cryptography in Networking

Cryptography in Networking

1
Comments
9 min read
Day ??? of learning go. Building cli apps

Day ??? of learning go. Building cli apps

Comments
2 min read
GnuPG and Digital Signatures

GnuPG and Digital Signatures

Comments
4 min read
Cryptography Concepts Simplified
Cover image for Cryptography Concepts Simplified

Cryptography Concepts Simplified

Comments
2 min read
The Hitchhiker’s Guide to Building an Encrypted Filesystem in Rust

The Hitchhiker’s Guide to Building an Encrypted Filesystem in Rust

1
Comments
1 min read
Cryptography #0 - Essential Concepts
Cover image for Cryptography #0 - Essential Concepts

Cryptography #0 - Essential Concepts

5
Comments
7 min read
An Introduction to Leo: Crafting Privacy-Preserving Blockchain Applications

An Introduction to Leo: Crafting Privacy-Preserving Blockchain Applications

1
Comments
6 min read
Preventing Weak Cryptography in JavaScript
Cover image for Preventing Weak Cryptography in JavaScript

Preventing Weak Cryptography in JavaScript

Comments
3 min read
loading...