Click here to Skip to main content
15,868,124 members
Everything / Security / Cryptography

Cryptography

cryptography

Great Reads

by Arpan Jati
RSA encryption library with full OAEP padding and private key encryption support
by Kewin Rausch
Design and development of a TOR-like protocol to keep your communication secure and your identity unknown
by Pavel Bashkardin
ARC4 (Alleged RC4) Cryptography Provider Class Library
by Cryptonite
The Blum Micali algorithm provides for a cryptographically secure PRNG (pseudo random number generator).

Latest Articles

by Daniel Ramnath
C++, Win32 API - Injecting DLL in a process
by Daniel Ramnath
C++ OpenSSL 3.1 Attack AES-CBC using Padding Oracle Attack, and Timing Attack
by Michael Chourdakis
Use SHA-3 and the CRYSTALS Kyber, Dilithium and Sphincs in Win32 projects
by Sergey Alexandrovich Kryukov
Generator of highly secure passwords based on cryptographic hash and master password, which should be memorized; no password storage is involved.

All Articles

Sort by Updated

Cryptography 

13 Aug 2023 by Michael Chourdakis
Use SHA-3 and the CRYSTALS Kyber, Dilithium and Sphincs in Win32 projects
28 Dec 2022 by Sergey Alexandrovich Kryukov
Generator of highly secure passwords based on cryptographic hash and master password, which should be memorized; no password storage is involved.
22 Sep 2022 by Raphael Amorim
How to get plain text session using CryptoAPI
26 Jul 2022 by raddevus
C’YaPass (Fully Open Source Software) now a Fully-Functioning Password Ecosystem which doesn’t store your passwords anywhere — You are the owner of your data.
30 Jun 2022 by raddevus
Fully working sample code and explanation of everything necessary to create authenticated encryption with AES256.
8 May 2022 by Bruno Tabbia
Creation of a substitution box starting from a key and using it in a direct substitution cipher
5 May 2022 by Jerome Vonk
Description of cryptographic hashes and practical examples on how to calculate them
5 Mar 2021 by Clark Fieseln
Low rate data exchange (e.g., chat) using audio steganography, ensuring privacy, anonymity and cybersecurity
14 Nov 2019 by CPallini
An assembly implementation of the AES-128 cipher algorithm for the 8051 microcontroller
22 Jul 2019 by Michael Chourdakis
A standard-compliant library for secure signing
23 May 2019 by Saira Fazal Qader
Conversion of image to byte and Encryption using 128 bit key than Decryption using the same key and re-conversion from byte to image
7 Feb 2019 by Sibeesh Passion
Create own cryptocurrency and own private consortium network in Azure
29 Jan 2018 by phil.o
C# implementation of sponge construction and SHA-3 hashing operations
16 Nov 2017 by raddevus
Complete source code that creates a solution so users never have to make up, memorize or type a password again
15 Oct 2017 by Kewin Rausch
Design and development of a TOR-like protocol to keep your communication secure and your identity unknown
21 Jan 2017 by Michael_Jacobsen
Encryption algorithm based on key self-mutation. Complete source code and samples.
9 Jan 2017 by Michael Haephrati
How to fetch and decrypt Wi-Fi stored credentials
6 Aug 2016 by raddevus
Plug this device into your computer and never type or memorize a password again. That's right, no need to memorize your Windows login (and you won't be able to because it will be so long and complex anyways).
29 Jun 2016 by TimMackey
A simple demonstration of public key cryptography and a character substitution encryption method.
3 Jun 2016 by raddevus
A novel approach to generate a secure way to login that doesn't require the user to ever memorize a password again. This method can be used with any web site, program, etc. and creates a more secure password than other methods.
21 Mar 2016 by Dharmesh_Kemkar
Basics on Cryptography, SSL and Digital Signature
30 Mar 2015 by Florian Rappl, Niki Kilbertus
Using Microsoft Azure to add advanced machine learning capabilities with connected IoT devices, which monitor activities of a baby and his or her environment.
26 Jan 2015 by 1337Architect
Handy classes to use the .NET Encryption/Decryption
6 Oct 2014 by Pavel Durov
This article will explain briefly how to use a basic encryption/decryption on Android and on .NET platforms, with focus on passing encrypted data from Android to .NET.
11 Oct 2013 by ASP.NET Community
At A large part of security in any web application is keeping your secrets secret.  Cryptography makes that
6 Jun 2013 by Fernando E. Braz
This is an alternative for "Secret Key Encryption Demo"
15 Jul 2012 by Arpan Jati
RSA encryption library with full OAEP padding and private key encryption support
19 Jun 2012 by Dominik Reichl
CSHA1 - A C++ class implementation of the SHA-1 hash algorithm
25 Apr 2011 by All Time Programming
Perform SSL Verification while using Web Services
21 Apr 2011 by All Time Programming
Verifying the Server Certificate on the client side using a CA file
25 Feb 2011 by Mario Majčica
Creating the X509 based on certificate and key in PEM format