Click here to Skip to main content

Cryptography and Security

Great Reads

by Jeffrey Walton
Import and export Cryptographic Keys in PKCS#8 and X.509 formats, using Crypto++, C#, and Java.
by Jeffrey Walton
Perform authenticated encryption with Crypto++.
by Alaa-eddine KADDOURI
iSafePDF is an Open Source software to sign, timestamp, and encrypt PDF documents.
by Corinna John
From tutorial snippets to open source project

Latest Articles

by Andrew Admire
Create a distributed P2P TMTO Hash database.
by John Simmons / outlaw programmer
Retrieve certificates from the system certificate store
by NewPast
Software protection & Decompiling software as a new cracking method
by Keyhole Software
The state of web application cryptography has changed, and each development language provides its own way of working with it. I will touch on the current state of random number generation and the differences found with it within the Java and JavaScript development languages. When designing and build

Research Library

The explosive growth of the mobile apps market presents a tremendous...
The efficacy of code signing as an authentication mechanism for...
Android is on the rise. Unfortunately, popularity can also bring...
Due to recent innovations in the mobile device industry, demand for...


by Andrew Admire on tip/trick "Distributed TMTO Hash Database"
by John Simmons / outlaw programmer on tip/trick "Get Certificates from the System Store"
by OriginalGriff on article "Distributed TMTO Hash Database"
by Andrew Admire on tip/trick "Distributed TMTO Hash Database"
by Andrew Admire on tip/trick "Distributed TMTO Hash Database"

All Articles