DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Cryptography Fundamentals: How Your Data Stays Secret in 2026

Cryptography Fundamentals: How Your Data Stays Secret in 2026

Comments
8 min read
Math cheatsheet before you deep-dive into ZK

Math cheatsheet before you deep-dive into ZK

Comments
6 min read
ECC Explained: The Geometry Powering Modern Digital Security

ECC Explained: The Geometry Powering Modern Digital Security

Comments
7 min read
Building an SM4 Encryption-Decryption Utility in ArkTS (SM4_128, PKCS7, CBC & GCM Tips)

Building an SM4 Encryption-Decryption Utility in ArkTS (SM4_128, PKCS7, CBC & GCM Tips)

Comments
4 min read
Evaluating a Deterministic Alternative to Probabilistic Coprime Set Generation

Evaluating a Deterministic Alternative to Probabilistic Coprime Set Generation

1
Comments
13 min read
A Case Study in Solving the Riddle of FrancisTRDEV

Mixed-shift riddle solving via AI consensus

A Case Study in Solving the Riddle of FrancisTRDEV

20
Comments 11
9 min read
What are Roots of Unity (and why do they matter in ZK)?

What are Roots of Unity (and why do they matter in ZK)?

Comments
13 min read
I Built a Blockchain Voting System with RSA Encryption — Here's How It Works

I Built a Blockchain Voting System with RSA Encryption — Here's How It Works

Comments
4 min read
RSA Explained: The Simple Math Behind Internet Security

RSA Explained: The Simple Math Behind Internet Security

Comments
7 min read
Zero-Knowledge AI Matching: Binarized Embeddings + Hamming Distance

Zero-Knowledge AI Matching: Binarized Embeddings + Hamming Distance

1
Comments
5 min read
I scanned popular open source projects for quantum-vulnerable crypto. Here's what I found.

I scanned popular open source projects for quantum-vulnerable crypto. Here's what I found.

Comments
3 min read
Cardsharing Protocol Deep Dive: Understanding DVB Decryption and Network Key Distribution

Cardsharing Protocol Deep Dive: Understanding DVB Decryption and Network Key Distribution

Comments
3 min read
From WannaCry to Building My Own Ransomware Lab: A Defensive Cybersecurity Journey

From WannaCry to Building My Own Ransomware Lab: A Defensive Cybersecurity Journey

Comments
3 min read
Forensic Architecture of a Scam: Deconstructing the BTDUex Fake Crypto Exchange

Forensic Architecture of a Scam: Deconstructing the BTDUex Fake Crypto Exchange

Comments
3 min read
NIP-04 Encryption in Python — The Complete Guide

NIP-04 Encryption in Python — The Complete Guide

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.