Tutorial by Topics: cryptography

The WebCrypto APIs are usually only available on "secure" origins, meaning that the document must have been loaded over HTTPS or from the local machine (from localhost, file:, or a browser extension). These APIs are specified by the W3C Web Cryptography API Candidate Recommendation. ...
Python, being one of the most popular languages in computer and network security, has great potential in security and cryptography. This topic deals with the cryptographic features and implementations in Python from its uses in computer and network security to hashing and encryption/decryption algor...
Modern cryptography is the cornerstone of computer and communications security. Its foundation is based on concepts of mathematics such as number theory, computational-complexity theory, and probability theory. Cryptography deals with the securing of digital data. It refers to the design of mecha...
/* Base64 Encoded Encryption / $enc_data = base64_encode( openssl_encrypt($data, $method, $password, true, $iv) ); / Decode and Decrypt */ $dec_data = base64_decode( openssl_decrypt($enc_data, $method, $password, true, $iv) ); This way of doing the encryption and encoding would not work as p...
.NET Framework provides implementation of many cryptographic algorithms. They include basically symmetric algorithms, asymmetric algorithms and hashes.
Security practices in Java can be separated into two broad, vaguely defined categories; Java platform security, and secure Java programming. Java platform security practices deal with managing the security and integrity of the JVM. It includes such topics as managing JCE providers and security poli...
Find out how to encrypt and decrypt data with Go. Keep in mind that this is not a course about cryptography but rather how to achieve it with Go.

Page 1 of 1