Cryptography Stories

64 Stories

DETECTIVE by SACHIKOOOOOO
#1
DETECTIVEby SACHIKO
Wanna be like Sherlock Holmes' Jr.? Problem no more.
Completed
Codes And Ciphers by SACHIKOOOOOO
#2
Codes And Ciphersby SACHIKO
A book of guide in Codes and Ciphers.
Codes and Ciphers  by RoseliaPoessy
#3
Codes and Ciphers by Angel Rosel DLPZ
It contains different codes where very applicable to all of you who loves mysteries. I also includes all of my learnings and studies that talks about unfamiliar ideas or...
CODES & CIPHERS by stuck_n_silence
#4
CODES & CIPHERSby stuck_n_silence
Compilation of codes, ciphers & some abbreviations to shorten the message before encrypting them. Learn the easiest way to remember Morse Code too.
The Blood Price by JonEvans
#5
The Blood Priceby Jon Evans
Sequel to the award-winning DARK PLACES. Paul Wood was just a tourist in Sarajevo. Then an unexpected encounter made him a desperate woman's only hope of escape. Now, to...
Completed
Codes and Ciphers by XiBela
#7
Codes and Ciphersby Isabela
Let's learn codes and ciphers
The Art of Secrecy: Exploring the IEEE Paper on Cryptography by JohnWilliam777
#8
The Art of Secrecy: Exploring the...by JohnWilliam777
Cryptography is a fundamental component of cybersecurity, essential for protecting sensitive information and securing communication channels. The IEEE (Institute of Elec...
Cryptic Crazyness by JRabideau
#10
Cryptic Crazynessby JRabideau
An agent decrypts his orders and doesn't like them.
Unlocking the Secrets: Exploring the IEEE Paper on Cryptography by JohnWilliam773
#11
Unlocking the Secrets: Exploring t...by John Williams
IEEE papers on cryptography serve as invaluable resources in the field of information security, offering insights into the latest advancements, techniques, and challenge...
A code in the night sky? (Sefer El) by ChadBurke5
#13
A code in the night sky? (Sefer El)by Chad Burke
This is real and it just may change the way you think about divine creation
Completed
Phishing in Cyber Security, Type of Attack in Cyber Security - FAQ by cybersecurity0123
#14
Phishing in Cyber Security, Type o...by Cyber Security
The increased online activity has raised the cyber security concern to avoid anyone becoming the victim of cybercrime. Cyber security has distinct types like critical in...
CODES AND CIPHER by Hystigy
#15
CODES AND CIPHERby Momo
It's all about cryptography,you should read it because theres a better explanation,and it's also tackle about it's origin.
In Between Bounces by Imagination_Rivers
#16
In Between Bouncesby Imagination_Rivers
Bounce, bounce, bounce, bounce, bounce. BOUNCE. Thus ending the cryptic message constantly thudding against Demara Sterling's wall. Demara had recently move into her ne...