Hossein KheirollahpourImplementing Authentication with JWT in Android (without using a library)Hi everyone!Dec 28, 2023Dec 28, 2023
Hossein KheirollahpourImplementation of secure encryption against attacks in financial Android applicationsHello there,Nov 30, 2023Nov 30, 2023
Hossein KheirollahpourImplementation of irreversible algorithms or HASH in AndroidIn this type of algorithm, a key isn’t generated. Instead, a user-input text is taken, and ultimately, based on the desired size, a unique…Nov 17, 2023Nov 17, 2023
Hossein KheirollahpourImplementation of Asymmetric Algorithm in AndroidIn these types of algorithms, two keys are created: one for encryption and another for decryption. Unlike symmetric algorithms, encryption…Nov 17, 2023Nov 17, 2023
Hossein KheirollahpourImplementation of Symmetric Algorithm in AndroidIn these algorithms, a single key is generated, enabling us to perform encryption on the Android client. Later, decryption must also be…Nov 10, 2023Nov 10, 2023
Hossein KheirollahpourData Security in AndroidHello! I hope you’re doing well. In this article, I aim to provide a concise and practical overview of data security in Android. Initially…Nov 10, 2023Nov 10, 2023