Click here to Skip to main content
14,027,272 members


Great Reads

by Arpan Jati
RSA encryption library with full OAEP padding and private key encryption support.
by Kewin Rausch
Design and development of a TOR-like protocol to keep your communication secure and your identity unknown.
by Michael Chourdakis
A standard-compliant library for secure signing
by phil.o
This article describes a C# implementation of the sponge construction and its use for SHA-3 hashing operations.

Latest Articles

by Sibeesh Passion
In this article, we will create our own cryptocurrency and our own private consortium network in Azure. We will be using Ethereum proof of work consortium solution from Azure.
by Jerome Vonk
Description of cryptographic hashes and practical examples on how to calculate them
by Michael Chourdakis
PDF signing with AdES
by Michael Chourdakis
A standard-compliant library for secure signing

All Articles

Sort by Score


23 Sep 2014
The Blum Micali algorithm provides for a cryptographically secure PRNG (pseudo random number generator).
28 Oct 2016
Deepraj Thuraka
Tweaking of the Bouncy Castle library to make it work with SecP128r1 curve1251
31 Jul 2012
Christian Amado
A very brief article about the implementation of encryption and decryption of a string in Silverlight Business Application
2 Sep 2014
This code gives a solution to the Chinese Remainder Theorem using totients instead of the Extended Euclidean algorithm.
21 Nov 2014
Farzad E. (dNetGuru)
.Net framework provides two classes that implement AES, a native implementation that calls CAPI and AesManaged which is a purely managed implementation. Which one should you use ?
30 Sep 2010
The sha1 hash generation tool can be used to generate hashes on a file. The has generated can be outputted in the form of dig/Hex/Base64. You may use this utility to verify the integrity of the file transported over internet to make sure they are safe from tampering.
8 Sep 2014
This tip shows you how to compile crypto++ for 64-bit environment.
27 Mar 2012
Marian Placko
This article shows a simple hack of a built-in MS SQL Server WITH ENCRYPTION mechanism
22 Apr 2012
Input drives action to perform : Encryption or Decryption - Implementation of user defined encryption signature with standard cryptographic algorithms
20 Aug 2013
Alexander Van Berg
Short case study for a do-it-yourself cryptography system.
15 Oct 2013
Embed secret messages in image files using Autohotkey.
6 Mar 2014
Dan Mihajlov
How a bad constant can cause a security breach
5 Mar 2018
Dharmateja Challa
This article is about generating random data using Trusted Platform Module in Windows 10 and testing its randomness using dieharder test suite.

Advertise | Privacy | Cookies | Terms of Service
Web04 | 2.8.190419.4 | Last Updated 20 Apr 2019
Copyright © CodeProject, 1999-2019
All Rights Reserved.
Layout: fixed | fluid