DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Enterprise Blockchain Patterns in TypeScript: Real Case Studies, Protocol Adapters & Post-Quantum Security

Enterprise Blockchain Patterns in TypeScript: Real Case Studies, Protocol Adapters & Post-Quantum Security

3
Comments
3 min read
SSH Keys in 2024: Why Ed25519 Replaced RSA as the Default

SSH Keys in 2024: Why Ed25519 Replaced RSA as the Default

Comments
2 min read
The Math Behind RSA #3: Implementing RSA from Scratch in Python

The Math Behind RSA #3: Implementing RSA from Scratch in Python

Comments
7 min read
VCP v1.1: Building a Flight Recorder for the SaaSpocalypse — Three-Layer Cryptographic Audit Trails for Algorithmic Trading

VCP v1.1: Building a Flight Recorder for the SaaSpocalypse — Three-Layer Cryptographic Audit Trails for Algorithmic Trading

Comments
12 min read
Reconstructing the SaaSpocalypse in Code: What VCP v1.1 Audit Trails Would Have Captured

Reconstructing the SaaSpocalypse in Code: What VCP v1.1 Audit Trails Would Have Captured

1
Comments
13 min read
Zero-Knowledge Privacy on Stellar: A Developer's Guide

Zero-Knowledge Privacy on Stellar: A Developer's Guide

Comments
2 min read
10 Common Misconceptions About ZK SNARKs

10 Common Misconceptions About ZK SNARKs

Comments
2 min read
Preparing for Quantum Computers That May or May Not Exist

Preparing for Quantum Computers That May or May Not Exist

Comments
7 min read
AES Cipher Encryption & Decryption with Example

AES Cipher Encryption & Decryption with Example

Comments
15 min read
The Math Behind RSA #2: Modular Arithmetic — When Clock Math Becomes Cryptography

The Math Behind RSA #2: Modular Arithmetic — When Clock Math Becomes Cryptography

Comments
8 min read
Building Authentication Without Collecting Any Personal Data

Building Authentication Without Collecting Any Personal Data

1
Comments
5 min read
How We Built a Cryptographic Provenance Protocol for AI Agents

How We Built a Cryptographic Provenance Protocol for AI Agents

Comments
3 min read
The Math Behind RSA #1: Primes and Prime Factorization

The Math Behind RSA #1: Primes and Prime Factorization

Comments
7 min read
Cryptography Fundamentals: How Your Data Stays Secret in 2026

Cryptography Fundamentals: How Your Data Stays Secret in 2026

Comments
8 min read
Building an SM4 Encryption-Decryption Utility in ArkTS (SM4_128, PKCS7, CBC & GCM Tips)

Building an SM4 Encryption-Decryption Utility in ArkTS (SM4_128, PKCS7, CBC & GCM Tips)

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.