DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
npm audit Won't Save You: Why We moved to TEEs (Trusted Execution Environments)

npm audit Won't Save You: Why We moved to TEEs (Trusted Execution Environments)

Comments
2 min read
Implementing Threshold Cryptography: Why We Ditched Standard PKI for MPC at SQHWYD

Implementing Threshold Cryptography: Why We Ditched Standard PKI for MPC at SQHWYD

Comments
2 min read
Beyond the Wire: Encrypting Messages Where the Message Never Exists

Beyond the Wire: Encrypting Messages Where the Message Never Exists

Comments
3 min read
This is my software journey

This is my software journey

Comments
2 min read
AIDE Automation Framework From Integrity Checks to Self-Verification

AIDE Automation Framework From Integrity Checks to Self-Verification

1
Comments
4 min read
Quantum Security's Blind Spot: When Eavesdroppers Fly Under the Radar by Arvind Sundararajan

Quantum Security's Blind Spot: When Eavesdroppers Fly Under the Radar by Arvind Sundararajan

Comments
2 min read
CipherMuse: The Haunted Fusion of AI, Encryption & Steganography🎃

CipherMuse: The Haunted Fusion of AI, Encryption & Steganography🎃

Comments
2 min read
Quantum Shadows: Can Eavesdroppers Erase Unbreakable Encryption?

Quantum Shadows: Can Eavesdroppers Erase Unbreakable Encryption?

Comments
2 min read
Dari Matematika Murni ke Enkripsi: Bagaimana G. H. Hardy Secara Tak Sengaja Menggerakkan Kriptografi Modern

Dari Matematika Murni ke Enkripsi: Bagaimana G. H. Hardy Secara Tak Sengaja Menggerakkan Kriptografi Modern

Comments
2 min read
Quantum Certifications: Are We Being Fooled? by Arvind Sundararajan

Quantum Certifications: Are We Being Fooled? by Arvind Sundararajan

Comments
2 min read
Quantum's Achilles Heel: How Subtle Attacks Can Blindside Security Systems by Arvind Sundararajan

Quantum's Achilles Heel: How Subtle Attacks Can Blindside Security Systems by Arvind Sundararajan

Comments
2 min read
Quantum Illusions: Can We Really Trust Our Entanglement Tests? by Arvind Sundararajan

Quantum Illusions: Can We Really Trust Our Entanglement Tests? by Arvind Sundararajan

Comments
2 min read
AIDE in Motion Automating and Signing System Integrity Checks

AIDE in Motion Automating and Signing System Integrity Checks

Comments
5 min read
AES Algorithm for beginners

AES Algorithm for beginners

Comments
11 min read
Cryptography in 2025: The Quantum Leap and the AI Arms Race

Cryptography in 2025: The Quantum Leap and the AI Arms Race

Comments
3 min read
Crypto-Shredding: How Immutable Audit Logs and GDPR Coexist

Crypto-Shredding: How Immutable Audit Logs and GDPR Coexist

Comments
4 min read
Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]

Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]

Comments
4 min read
Mastering Cryptography: A Senior's Guide to Design, Attack, and Defend

Mastering Cryptography: A Senior's Guide to Design, Attack, and Defend

Comments
10 min read
The VeritasChain Protocol: A Cryptographic Audit Standard for the Algorithmic Trading Era

The VeritasChain Protocol: A Cryptographic Audit Standard for the Algorithmic Trading Era

Comments 1
4 min read
Building a Production-Ready Blind Signature eCash System in Rust

Building a Production-Ready Blind Signature eCash System in Rust

Comments
5 min read
Top 10 Modern Cryptography Practices for Secure P2P Chat (2025–2026)

Top 10 Modern Cryptography Practices for Secure P2P Chat (2025–2026)

Comments
3 min read
Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

1
Comments
4 min read
How Does Digital Trust Actually Work? A Deep Dive into the Science of Secrecy

How Does Digital Trust Actually Work? A Deep Dive into the Science of Secrecy

Comments
8 min read
Secure Remote Password (SRP) protocol

Secure Remote Password (SRP) protocol

3
Comments
14 min read
Cracking Codes (and Scheduling Conflicts): My Intro to Cryptography with the ZK Bootcamp

Cracking Codes (and Scheduling Conflicts): My Intro to Cryptography with the ZK Bootcamp

2
Comments
3 min read
loading...