Click here to Skip to main content
15,860,972 members
Everything / Security / Cryptography

Cryptography

cryptography

Great Reads

by Arpan Jati
RSA encryption library with full OAEP padding and private key encryption support
by Kewin Rausch
Design and development of a TOR-like protocol to keep your communication secure and your identity unknown
by Pavel Bashkardin
ARC4 (Alleged RC4) Cryptography Provider Class Library
by Cryptonite
The Blum Micali algorithm provides for a cryptographically secure PRNG (pseudo random number generator).

Latest Articles

by Daniel Ramnath
C++, Win32 API - Injecting DLL in a process
by Daniel Ramnath
C++ OpenSSL 3.1 Attack AES-CBC using Padding Oracle Attack, and Timing Attack
by Michael Chourdakis
Use SHA-3 and the CRYSTALS Kyber, Dilithium and Sphincs in Win32 projects
by Sergey Alexandrovich Kryukov
Generator of highly secure passwords based on cryptographic hash and master password, which should be memorized; no password storage is involved.

All Articles

Sort by Score

Cryptography 

15 Jul 2012 by Arpan Jati
RSA encryption library with full OAEP padding and private key encryption support
15 Oct 2017 by Kewin Rausch
Design and development of a TOR-like protocol to keep your communication secure and your identity unknown
29 Jan 2018 by phil.o
C# implementation of sponge construction and SHA-3 hashing operations
5 Mar 2021 by Clark Fieseln
Low rate data exchange (e.g., chat) using audio steganography, ensuring privacy, anonymity and cybersecurity
14 Nov 2019 by CPallini
An assembly implementation of the AES-128 cipher algorithm for the 8051 microcontroller
7 Feb 2019 by Sibeesh Passion
Create own cryptocurrency and own private consortium network in Azure
8 May 2022 by Bruno Tabbia
Creation of a substitution box starting from a key and using it in a direct substitution cipher
30 Jun 2022 by raddevus
Fully working sample code and explanation of everything necessary to create authenticated encryption with AES256.
11 Oct 2013 by ASP.NET Community
At A large part of security in any web application is keeping your secrets secret.  Cryptography makes that
9 Jan 2017 by Michael Haephrati
How to fetch and decrypt Wi-Fi stored credentials
28 Dec 2022 by Sergey Alexandrovich Kryukov
Generator of highly secure passwords based on cryptographic hash and master password, which should be memorized; no password storage is involved.
26 Jul 2022 by raddevus
C’YaPass (Fully Open Source Software) now a Fully-Functioning Password Ecosystem which doesn’t store your passwords anywhere — You are the owner of your data.
22 Jul 2019 by Michael Chourdakis
A standard-compliant library for secure signing
6 Jun 2013 by Fernando E. Braz
This is an alternative for "Secret Key Encryption Demo"
6 Aug 2016 by raddevus
Plug this device into your computer and never type or memorize a password again. That's right, no need to memorize your Windows login (and you won't be able to because it will be so long and complex anyways).
6 Oct 2014 by Pavel Durov
This article will explain briefly how to use a basic encryption/decryption on Android and on .NET platforms, with focus on passing encrypted data from Android to .NET.
30 Mar 2015 by Florian Rappl, Niki Kilbertus
Using Microsoft Azure to add advanced machine learning capabilities with connected IoT devices, which monitor activities of a baby and his or her environment.
5 May 2022 by Jerome Vonk
Description of cryptographic hashes and practical examples on how to calculate them
22 Sep 2022 by Raphael Amorim
How to get plain text session using CryptoAPI
25 Feb 2011 by Mario Majčica
Creating the X509 based on certificate and key in PEM format
19 Jun 2012 by Dominik Reichl
CSHA1 - A C++ class implementation of the SHA-1 hash algorithm
16 Nov 2017 by raddevus
Complete source code that creates a solution so users never have to make up, memorize or type a password again
21 Apr 2011 by All Time Programming
Verifying the Server Certificate on the client side using a CA file
21 Mar 2016 by Dharmesh_Kemkar
Basics on Cryptography, SSL and Digital Signature
21 Jan 2017 by Michael_Jacobsen
Encryption algorithm based on key self-mutation. Complete source code and samples.
13 Aug 2023 by Michael Chourdakis
Use SHA-3 and the CRYSTALS Kyber, Dilithium and Sphincs in Win32 projects
26 Jan 2015 by 1337Architect
Handy classes to use the .NET Encryption/Decryption
3 Jun 2016 by raddevus
A novel approach to generate a secure way to login that doesn't require the user to ever memorize a password again. This method can be used with any web site, program, etc. and creates a more secure password than other methods.
25 Apr 2011 by All Time Programming
Perform SSL Verification while using Web Services
23 May 2019 by Saira Fazal Qader
Conversion of image to byte and Encryption using 128 bit key than Decryption using the same key and re-conversion from byte to image
29 Jun 2016 by TimMackey
A simple demonstration of public key cryptography and a character substitution encryption method.