DEV Community

# cryptography

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to truncate CBC ciphertext

How to truncate CBC ciphertext

Comments
8 min read
Bitflip Attack on CBC: Change of the Ciphertext

Bitflip Attack on CBC: Change of the Ciphertext

Comments
5 min read
Introducing Inline Cryptography Toolkit: Simplify Encryption, Decryption, and Hashing in VS Code 🚀

Introducing Inline Cryptography Toolkit: Simplify Encryption, Decryption, and Hashing in VS Code 🚀

Comments
2 min read
Bitflip Attack on CBC: Change of the IV

Bitflip Attack on CBC: Change of the IV

Comments
3 min read
Exploring Quantum Computing: The Next Frontier in Technology (2025)

Exploring Quantum Computing: The Next Frontier in Technology (2025)

1
Comments 1
4 min read
Como Habilitar o Provedor Legado no OpenSSL 3.x

Como Habilitar o Provedor Legado no OpenSSL 3.x

Comments
2 min read
VB .Net: Secure Password

VB .Net: Secure Password

Comments
1 min read
C#: Secure Password

C#: Secure Password

Comments
1 min read
Enhancing Data Security with MongoDB: A Dive into Cryptography and CSFLE at Ovianta

Enhancing Data Security with MongoDB: A Dive into Cryptography and CSFLE at Ovianta

Comments
3 min read
What is Post-Quantum Cryptography (PQC) Migration and How to Secure Data Against Quantum Threats

What is Post-Quantum Cryptography (PQC) Migration and How to Secure Data Against Quantum Threats

Comments
3 min read
"Behind the Code: How Dark Web Drug Marketplaces Operate and the Developers Who Build Them"

"Behind the Code: How Dark Web Drug Marketplaces Operate and the Developers Who Build Them"

Comments
4 min read
The Ultimate Guide to Choosing the Right Cryptography Algorithm for Your Project

The Ultimate Guide to Choosing the Right Cryptography Algorithm for Your Project

Comments
4 min read
Lithe Crypt: Simplifying Encryption in PHP Applications

Lithe Crypt: Simplifying Encryption in PHP Applications

4
Comments
2 min read
Addressing The Threat of Deepfakes With Authentic Images

Addressing The Threat of Deepfakes With Authentic Images

Comments
8 min read
Camouflage-Shield: An Image Encryption Application.

Camouflage-Shield: An Image Encryption Application.

6
Comments
4 min read
Comparing Decentralized Identifiers(DID) Methods

Comparing Decentralized Identifiers(DID) Methods

9
Comments
5 min read
Decentralized Identity Simplified: How to Resolve DIDs Effectively

Decentralized Identity Simplified: How to Resolve DIDs Effectively

3
Comments
3 min read
Key Management for DIDs in Web5: A Beginner’s Guide

Key Management for DIDs in Web5: A Beginner’s Guide

6
Comments
4 min read
Key Management for DIDs: A Beginner's Journey

Key Management for DIDs: A Beginner's Journey

1
Comments
4 min read
Understanding Web5 and Its Potential

Understanding Web5 and Its Potential

17
Comments 7
4 min read
Cryptography in Networking

Cryptography in Networking

1
Comments
9 min read
Day ??? of learning go. Building cli apps

Day ??? of learning go. Building cli apps

Comments
2 min read
GnuPG and Digital Signatures

GnuPG and Digital Signatures

Comments
4 min read
Cryptography Concepts Simplified

Cryptography Concepts Simplified

Comments
2 min read
The Hitchhiker’s Guide to Building an Encrypted Filesystem in Rust

The Hitchhiker’s Guide to Building an Encrypted Filesystem in Rust

1
Comments
1 min read
loading...