Click here to Skip to main content
13,898,459 members

Cryptography & Security

Great Reads

by Jeffrey Walton
Import and export Cryptographic Keys in PKCS#8 and X.509 formats, using Crypto++, C#, and Java.
by Marius Bancila
This article proposes a C++ implementation for computing hashes (SHA1, MD5, MD4 and MD2) on Windows with the Microsoft CryptoAPI library.
by Arpan Jati
RSA encryption library with full OAEP padding and private key encryption support.
by Michael Haephrati
Chrome stores all passwords and other credentials in an encrypted database but guess what: they can be retrieved by anyone with the proper knowledge. This article will show you how.

Latest Articles

by Martin Vorbrodt
Memory barriers and thread synchronization
by Jerome Vonk
Description of cryptographic hashes and practical examples on how to calculate them
by Apriorit Inc, Sergey Stepanchuk
Learn how you can use ftrace to hook critical function calls in the Linux kernel
by Apriorit Inc
In this article, we focus on the main ftrace pros and cons and describe some unexpected surprises we’ve faced when hooking Linux kernel functions with this utility.


by on Article "How to run Makecert without password...
by on tip/trick "Protection & Decompiling Software "
by on article "Basic Cryptography Protocols: Key...
by on Global System Hooks in .NET
by on article "A Ready To Use Software Licensing...

All Articles