DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to implement GHASH

How to implement GHASH

Comments
9 min read
Implementing Threshold Cryptography: Why We Ditched Standard PKI for MPC at SQHWYD

Implementing Threshold Cryptography: Why We Ditched Standard PKI for MPC at SQHWYD

5
Comments
2 min read
Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)

Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)

1
Comments
7 min read
Building a "Zero-Knowledge" RSA Tool: Crafting the Ultimate Client-Side Encryption Demo

Building a "Zero-Knowledge" RSA Tool: Crafting the Ultimate Client-Side Encryption Demo

3
Comments 3
1 min read
Cryptography in 2025: The Quantum Leap and the AI Arms Race

Cryptography in 2025: The Quantum Leap and the AI Arms Race

Comments
3 min read
Crypto-Shredding: How Immutable Audit Logs and GDPR Coexist

Crypto-Shredding: How Immutable Audit Logs and GDPR Coexist

Comments
4 min read
npm audit Won't Save You: Why We moved to TEEs (Trusted Execution Environments)

npm audit Won't Save You: Why We moved to TEEs (Trusted Execution Environments)

Comments 1
2 min read
Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]

Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]

Comments
4 min read
Mastering Cryptography: A Senior's Guide to Design, Attack, and Defend

Mastering Cryptography: A Senior's Guide to Design, Attack, and Defend

Comments
10 min read
The VeritasChain Protocol: A Cryptographic Audit Standard for the Algorithmic Trading Era

The VeritasChain Protocol: A Cryptographic Audit Standard for the Algorithmic Trading Era

Comments 1
4 min read
This is my software journey

This is my software journey

Comments
2 min read
Building a Production-Ready Blind Signature eCash System in Rust

Building a Production-Ready Blind Signature eCash System in Rust

Comments
5 min read
Top 10 Modern Cryptography Practices for Secure P2P Chat (2025–2026)

Top 10 Modern Cryptography Practices for Secure P2P Chat (2025–2026)

Comments
3 min read
Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

1
Comments
4 min read
Secure Remote Password (SRP) protocol

Secure Remote Password (SRP) protocol

2
Comments
14 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.