Jesse Wei's Logo
HomeWritingsArtworksAbout
  • All43
  • Dev27
  • Design15
  • Tutorial10
  • QUT6
  • Security5
  • Web5

Writings - Security

Design, tech, innovation and more.

  • All43
  • Dev27
  • Design15
  • Tutorial10
  • QUT6
  • Security5
  • Web5

Common Asymmetric Algorithms (Part 2): ECC

Elliptic Curve Cryptography (ECC) is an asymmetric cryptographic algorithm that is gaining popularit...

security
Published at: 14/07/2025

Common Asymmetric Algorithms (Part 1): RSA

Rivest–Shamir–Adleman (RSA) is one of the most well-known algorithms for asymmetric cryptography. It...

security
Published at: 11/07/2025

Symmetric vs. Asymmetric Cryptography

Cryptography is the foundation of digital security—from protecting your messages and passwords to se...

security
tricks
Published at: 10/07/2025

Designing Password UIs That Enhance Security and Usability

Many sign-up forms still use a password UI pattern that may seem secure at first glance, but is prob...

design
uiux
security
Published at: 08/07/2025

Passkeys: Demystified

Passkeys are gaining popularity, but what exactly is a passkey? How is it different from a password?...

qut
cs
security
Published at: 22/06/2025
  • LinkedIn

  • GitHub

  • Instagram

© 2025 Jesse Wei