asymmetrical encryption
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2023%2F06%2FSecurity_Terms101_Blogheader_1600x900.jpg&w=3840&q=75)
Security Terms 101: What Zero-Knowledge Architecture, Encryption, and More Really Mean
Learn more about industry terms such as zero-knowledge, encryption, key derivation functions, confidential computing, zero-trust, and more.
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2023%2F03%2FSEO-Blog-Header_17_blue.png&w=3840&q=75)
A Complete Guide to Asymmetric Encryption: Definition & Uses
Asymmetric encryption is a powerful tool used for many everyday online transactions and communications, like messaging and email.
![A green and blue background with three blue slanted rectangles in the middle. A white Dashlane logo is overlaid on top.](/_next/image?url=%2Fimages%2Fblog-post-default.webp&w=3840&q=75)
How Dashlane is Reinventing Credential Sharing for Consumers & Businesses
Sharing credentials with friends, family members, and co-workers is a key feature of Dashlane’s password manager. Dashlane allows you to share your Netflix account with your family, your company’s Twitter account credentials with a co-worker, and keeps shared credentials in sync on multiple computers, phones, and tablets. I’ll explain how Dashlane safely shares your passwords and […]