close

DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Post-Quantum Security Is an Infrastructure Problem, Not a Future Upgrade

Post-Quantum Security Is an Infrastructure Problem, Not a Future Upgrade

Comments 1
3 min read
Post-Quantum Security Is Not Just About Algorithms. It’s About Systems.

Post-Quantum Security Is Not Just About Algorithms. It’s About Systems.

Comments
3 min read
I Built a PQC Native L1 Blockchain from Scratch in 9 Months

I Built a PQC Native L1 Blockchain from Scratch in 9 Months

Comments
2 min read
The Blindfold That Sees

The Blindfold That Sees

Comments
6 min read
Engineering the Nexus Release: How I Built Secure E2EE Network Sync into a Linux Clipboard Manager (v1.5.1)

Engineering the Nexus Release: How I Built Secure E2EE Network Sync into a Linux Clipboard Manager (v1.5.1)

Comments
9 min read
Classical Ciphers With Chi-Squared Frequency Analysis for Auto-Decryption

Classical Ciphers With Chi-Squared Frequency Analysis for Auto-Decryption

Comments
3 min read
[x509Lab]Generating Ed25519 Certificate Chains in the Browser (No Server Required)

[x509Lab]Generating Ed25519 Certificate Chains in the Browser (No Server Required)

Comments
2 min read
# I Replaced a $100K Security Audit with a CI Pipeline — And It Caught More Bugs

# I Replaced a $100K Security Audit with a CI Pipeline — And It Caught More Bugs

Comments
5 min read
QRVA: A protocol for cryptographic verification of physical QR codes — design decisions and open questions

QRVA: A protocol for cryptographic verification of physical QR codes — design decisions and open questions

Comments
11 min read
Lagrange interpolation: turning points into a polynomial

Lagrange interpolation: turning points into a polynomial

Comments
6 min read
Digital signatures: Schnorr, ECDSA and how PS3 was hacked

Digital signatures: Schnorr, ECDSA and how PS3 was hacked

Comments
9 min read
Animated Cryptographic QR Codes: Killing Screenshot Attacks at the Display Layer

Animated Cryptographic QR Codes: Killing Screenshot Attacks at the Display Layer

Comments
5 min read
Private keys and elliptic curves: a deep-dive for people who don't like math

Private keys and elliptic curves: a deep-dive for people who don't like math

Comments
7 min read
How to Prepare Your TLS Stack for Post-Quantum Cryptography Today

How to Prepare Your TLS Stack for Post-Quantum Cryptography Today

Comments
5 min read
The 2029 Deadline Nobody Building Agent Infrastructure Is Talking About

The 2029 Deadline Nobody Building Agent Infrastructure Is Talking About

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.