Click here to Skip to main content
12,405,088 members (65,429 online)

Cryptography & Security

Great Reads

by Jeffrey Walton
Import and export Cryptographic Keys in PKCS#8 and X.509 formats, using Crypto++, C#, and Java.
by Jeffrey Walton
Perform authenticated encryption with Crypto++.
by Marius Bancila
This article proposes a C++ implementation for computing hashes (SHA1, MD5, MD4 and MD2) on Windows with the Microsoft CryptoAPI library.
by Corinna John
From tutorial snippets to open source project

Latest Articles

by TimMackey
A simple demonstration of public key cryptography and a character substitution encryption method.
by raddevus
A novel approach to generate a secure way to login that doesn't require the user to ever memorize a password again. This method can be used with any web site, program, etc. and creates a more secure password than other methods.
by Simon Bridge
Help prevent clock tampering and enforce a software licence
by Serge Berlin
Remove the artificial encryption key length limitation by using the power of the extended cryptographic key concept with parallel programming.

Research Library

Every developer wants to write good code – code they can be proud of....
Up to 80% of the source code in many new commercial and enterprise...
Errors that are introduced into software code can cause major problems...
While there’s no doubt that open source software is here to stay, that...


by Igor Ladnik on article "Anti-Reflector .NET Code Protection"
by 张桂华 on article "Anti-Reflector .NET Code Protection"
by Igor Ladnik on article "Anti-Reflector .NET Code Protection"
by 张桂华 on article "Anti-Reflector .NET Code Protection"
by ImageProcessingExpert on Cryptographically Strong Random Password...

All Articles