Click here to Skip to main content
14,930,870 members
Everything / Security / Cryptography

Cryptography

cryptography

Great Reads

by Arpan Jati
RSA encryption library with full OAEP padding and private key encryption support
by Kewin Rausch
Design and development of a TOR-like protocol to keep your communication secure and your identity unknown.
by Cryptonite
The Blum Micali algorithm provides for a cryptographically secure PRNG (pseudo random number generator).
by phil.o
This article describes a C# implementation of the sponge construction and its use for SHA-3 hashing operations.

Latest Articles

by Clark Fieseln
Low rate data exchange (e.g., chat) using audio steganography, ensuring privacy, anonymity and cybersecurity
by Apprieu (Apprieu)
How to generate a serial key with Crypto API MFC
by CPallini
An assembly implementation of the AES-128 cipher algorithm for the 8051 microcontroller
by Michael Chourdakis
A standard-compliant library for secure signing

All Articles

Sort by Score

Cryptography 

Please Sign up or sign in to vote.
15 Jul 2012
Arpan Jati
RSA encryption library with full OAEP padding and private key encryption support
Please Sign up or sign in to vote.
15 Oct 2017
Kewin Rausch
Design and development of a TOR-like protocol to keep your communication secure and your identity unknown.
Please Sign up or sign in to vote.
29 Jan 2018
phil.o
This article describes a C# implementation of the sponge construction and its use for SHA-3 hashing operations.
Please Sign up or sign in to vote.
5 Mar 2021
Clark Fieseln
Low rate data exchange (e.g., chat) using audio steganography, ensuring privacy, anonymity and cybersecurity
Please Sign up or sign in to vote.
14 Nov 2019
CPallini
An assembly implementation of the AES-128 cipher algorithm for the 8051 microcontroller
Please Sign up or sign in to vote.
7 Feb 2019
Sibeesh Passion
In this article, we will create our own cryptocurrency and our own private consortium network in Azure. We will be using Ethereum proof of work consortium solution from Azure.
Please Sign up or sign in to vote.
11 Oct 2013
ASP.NET Community
At A large part of security in any web application is keeping your secrets secret.  Cryptography makes that
Please Sign up or sign in to vote.
9 Jan 2017
Michael Haephrati
How to fetch and decrypt Wi-Fi stored credentials
Please Sign up or sign in to vote.
22 Jul 2019
Michael Chourdakis
A standard-compliant library for secure signing
Please Sign up or sign in to vote.
20 Nov 2011
Dominik Reichl
A C# implementation of the BLAKE hash algorithm.
Please Sign up or sign in to vote.
6 Jun 2013
Fernando E. Braz
This is an alternative for "Secret Key Encryption Demo"
Please Sign up or sign in to vote.
6 Aug 2016
raddevus
Plug this device into your computer and never type or memorize a password again. That's right, no need to memorize your Windows login (and you won't be able to because it will be so long and complex anyways).
Please Sign up or sign in to vote.
6 Oct 2014
Pavel Durov
This article will explain briefly how to use a basic encryption/decryption on Android and on .NET platforms, with focus on passing encrypted data from Android to .NET.
Please Sign up or sign in to vote.
30 Mar 2015
Florian Rappl, Niki Kilbertus
Using Microsoft Azure to add advanced machine learning capabilities with connected IoT devices, which monitor activities of a baby and his or her environment.
Please Sign up or sign in to vote.
26 Jan 2019
Jerome Vonk
Description of cryptographic hashes and practical examples on how to calculate them
Please Sign up or sign in to vote.
25 Feb 2011
Mario Majčica
Creating the X509 based on certificate and key in PEM format
Please Sign up or sign in to vote.
19 Jun 2012
Dominik Reichl
CSHA1 - A C++ class implementation of the SHA-1 hash algorithm
Please Sign up or sign in to vote.
16 Nov 2017
raddevus
Get complete source that creates a solution so users never have to memorize, type or make up a password again. I've open-sourced the entire code base to the apps on all platforms(iOS,Android, WinForm, Web)
Please Sign up or sign in to vote.
21 Apr 2011
All Time Programming
Verifying the Server Certificate on the client side using a CA file
Please Sign up or sign in to vote.
10 Mar 2012
captnmac
A Tiger hash Implementation for C#, based on .NET's HashAlgorithm class.
Please Sign up or sign in to vote.
21 Jan 2017
Michael_Jacobsen
Encryption algorithm based on key self-mutation. Complete source code and samples.
Please Sign up or sign in to vote.
26 Jan 2015
1337Architect
Handy classes to use the .NET Encryption/Decryption
Please Sign up or sign in to vote.
3 Jun 2016
raddevus
A novel approach to generate a secure way to login that doesn't require the user to ever memorize a password again. This method can be used with any web site, program, etc. and creates a more secure password than other methods.
Please Sign up or sign in to vote.
25 Apr 2011
All Time Programming
Perform SSL Verification while using Web Services
Please Sign up or sign in to vote.
29 Jun 2016
TimMackey
A simple demonstration of public key cryptography and a character substitution encryption method.
Please Sign up or sign in to vote.
23 May 2019
Saira Fazal Qader
Conversion of image to byte and Encryption using 128 bit key than Decryption using the same key and re-conversion from byte to image