InfoQ Homepage Cryptography Content on InfoQ
-
Application-Layer Encryption Basics for Developers
Isaac Potoczny-Jones covers the basics of encryption, what are application-layer and infrastructure-layer encryption, when to use asymmetric and symmetric keys, and how to do key management.
-
Predicting Cryptocurrency Exchange Rates with Stream Processing, Social Data and Online Learning
Tim Frey discusses how iunera used social data from Twitter in machine learning to predict crypto currency exchange rates.
-
How to Use Encryption for Defense in Depth in Native and Browser Apps
Isaac Potoczny-Jones discusses the pros and cons of application-level and end-to-end encryption.
-
The Anatomy of Building a Compliant PCF Service in a Limited Connectivity Environment #BoomSauce
Joshua Kirchmeier and Garrett Klok discuss the techniques used to achieve DFARS compliance within AWS GovCloud, and troubleshooting challenges faced with using PCF in a limited connectivity IaaS.
-
Capacity Planning for Crypto Mania
Jordan Sitkin and Luke Demi talk about how Coinbase had to deal with the cryptocurrency spikes of 2017.
-
Implementing PII Encryption with PDX Serialization
Gideon Low and Niranjan Sarvi describe an implementation of PII encryption for Geode applications via use of custom PDX Serialization.
-
Making Security Usable: Product Engineer Perspective
Anastasiia Voitova goes through several stages of inception and implementation of database encryption and intrusion detection tools.
-
How Blockchain Has Created a New Paradigm in Security
Paul Puey explains how the new type of security created by the cryptocurrency companies could disrupt the way that data is secured outside of the blockchain industry.
-
Cryptoeconomics - The Application of Economic Systems, Incentives and Mechanisms
Jomari Peterson discusses crypto-economics and some of the significant considerations when designing a cryptocurrency.
-
Cybersecurity - Hacking / Anti-Phishing / Social Engineering
Paul Walsh discusses how crypto companies can keep their team and their communities safe from cyber attacks.
-
Encryption without Magic, Risk Management without Pain
Anastasiia Voitova talks about cryptography in a wider context: how it helps to narrow more significant risks to controlled attack surfaces, enables managing the risk efficiently & elegantly, and more
-
Abstractions to Help Developers Write Good Crypto
Isaac Potoczny-Jones discusses the impact of programming abstractions on the correctness of cryptographic code, and shows why some cryptographic libraries succeed while others fail.