DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Understanding ECDSA Signatures with the Web Crypto API

Understanding ECDSA Signatures with the Web Crypto API

1
Comments
6 min read
The Quantum Threat: How Quantum Computers Will Break Modern Cryptography

The Quantum Threat: How Quantum Computers Will Break Modern Cryptography

Comments
7 min read
Enterprise Blockchain Patterns in TypeScript: Real Case Studies, Protocol Adapters & Post-Quantum Security

Enterprise Blockchain Patterns in TypeScript: Real Case Studies, Protocol Adapters & Post-Quantum Security

3
Comments
3 min read
SSH Keys in 2024: Why Ed25519 Replaced RSA as the Default

SSH Keys in 2024: Why Ed25519 Replaced RSA as the Default

Comments
2 min read
The Math Behind RSA #3: Implementing RSA from Scratch in Python

The Math Behind RSA #3: Implementing RSA from Scratch in Python

Comments
7 min read
I built a browser-based X.509 certificate chain builder (no dependencies, pure Web Crypto API)

I built a browser-based X.509 certificate chain builder (no dependencies, pure Web Crypto API)

Comments
2 min read
VCP v1.1: Building a Flight Recorder for the SaaSpocalypse — Three-Layer Cryptographic Audit Trails for Algorithmic Trading

VCP v1.1: Building a Flight Recorder for the SaaSpocalypse — Three-Layer Cryptographic Audit Trails for Algorithmic Trading

Comments
12 min read
Reconstructing the SaaSpocalypse in Code: What VCP v1.1 Audit Trails Would Have Captured

Reconstructing the SaaSpocalypse in Code: What VCP v1.1 Audit Trails Would Have Captured

1
Comments
13 min read
Zero-Knowledge Privacy on Stellar: A Developer's Guide

Zero-Knowledge Privacy on Stellar: A Developer's Guide

Comments
2 min read
Why Your Computer Can't Just Pick a Number: Navigating the Spectrum of Randomness

Why Your Computer Can't Just Pick a Number: Navigating the Spectrum of Randomness

1
Comments
4 min read
Preparing for Quantum Computers That May or May Not Exist

Preparing for Quantum Computers That May or May Not Exist

Comments
7 min read
The Math Behind RSA #2: Modular Arithmetic — When Clock Math Becomes Cryptography

The Math Behind RSA #2: Modular Arithmetic — When Clock Math Becomes Cryptography

Comments
8 min read
Building Authentication Without Collecting Any Personal Data

Building Authentication Without Collecting Any Personal Data

1
Comments
5 min read
Why Current Cryptography Will Eventually Break

Why Current Cryptography Will Eventually Break

Comments
6 min read
The Math Behind RSA #1: Primes and Prime Factorization

The Math Behind RSA #1: Primes and Prime Factorization

Comments
7 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.