DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cryptographic Time Travel: Securely Locking Data Until the Future with tlock

Cryptographic Time Travel: Securely Locking Data Until the Future with tlock

Comments
3 min read
암호화 기초 - 대칭키, HMAC, 그리고 메시지 인증

암호화 기초 - 대칭키, HMAC, 그리고 메시지 인증

Comments
2 min read
How to implement GHASH

How to implement GHASH

Comments
9 min read
Building Tamper-Evident Audit Trails for Algorithmic Trading: A Developer's Guide

Building Tamper-Evident Audit Trails for Algorithmic Trading: A Developer's Guide

Comments
8 min read
Building Cryptographically Enforced Time-Locked Vaults on Cloudflare's Edge

Building Cryptographically Enforced Time-Locked Vaults on Cloudflare's Edge

Comments
7 min read
(Part 5) Sealing Secrets: How to Survive a Reboot (And Why It's Dangerous) 💾

(Part 5) Sealing Secrets: How to Survive a Reboot (And Why It's Dangerous) 💾

1
Comments 1
3 min read
Protecting Sensitive Data Using Envelope Encryption

Protecting Sensitive Data Using Envelope Encryption

Comments
6 min read
Building Cryptographic Audit Trails for SEC Rule 17a-4: A Technical Deep Dive

Building Cryptographic Audit Trails for SEC Rule 17a-4: A Technical Deep Dive

Comments
9 min read
The EU AI Act Doesn't Mandate Cryptographic Logs—But You'll Want Them Anyway

The EU AI Act Doesn't Mandate Cryptographic Logs—But You'll Want Them Anyway

Comments
8 min read
Announcing securebit_core: A Platform-Agnostic Cryptographic Kernel for Secure P2P Communication

Announcing securebit_core: A Platform-Agnostic Cryptographic Kernel for Secure P2P Communication

Comments
3 min read
RSA Algorithm

RSA Algorithm

Comments
5 min read
Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)

Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)

Comments
7 min read
Beyond the Wire: Encrypting Messages Where the Message Never Exists

Beyond the Wire: Encrypting Messages Where the Message Never Exists

Comments
3 min read
AIDE Automation Framework From Integrity Checks to Self-Verification

AIDE Automation Framework From Integrity Checks to Self-Verification

1
Comments
4 min read
Quantum Security's Blind Spot: When Eavesdroppers Fly Under the Radar by Arvind Sundararajan

Quantum Security's Blind Spot: When Eavesdroppers Fly Under the Radar by Arvind Sundararajan

Comments
2 min read
CipherMuse: The Haunted Fusion of AI, Encryption & Steganography🎃

CipherMuse: The Haunted Fusion of AI, Encryption & Steganography🎃

Comments
2 min read
Quantum Shadows: Can Eavesdroppers Erase Unbreakable Encryption?

Quantum Shadows: Can Eavesdroppers Erase Unbreakable Encryption?

Comments
2 min read
Dari Matematika Murni ke Enkripsi: Bagaimana G. H. Hardy Secara Tak Sengaja Menggerakkan Kriptografi Modern

Dari Matematika Murni ke Enkripsi: Bagaimana G. H. Hardy Secara Tak Sengaja Menggerakkan Kriptografi Modern

Comments
2 min read
Quantum Certifications: Are We Being Fooled? by Arvind Sundararajan

Quantum Certifications: Are We Being Fooled? by Arvind Sundararajan

Comments
2 min read
Quantum's Achilles Heel: How Subtle Attacks Can Blindside Security Systems by Arvind Sundararajan

Quantum's Achilles Heel: How Subtle Attacks Can Blindside Security Systems by Arvind Sundararajan

Comments
2 min read
Quantum Illusions: Can We Really Trust Our Entanglement Tests? by Arvind Sundararajan

Quantum Illusions: Can We Really Trust Our Entanglement Tests? by Arvind Sundararajan

Comments
2 min read
AIDE in Motion Automating and Signing System Integrity Checks

AIDE in Motion Automating and Signing System Integrity Checks

Comments
5 min read
AES Algorithm for beginners

AES Algorithm for beginners

Comments
11 min read
Building a "Zero-Knowledge" RSA Tool: Crafting the Ultimate Client-Side Encryption Demo

Building a "Zero-Knowledge" RSA Tool: Crafting the Ultimate Client-Side Encryption Demo

2
Comments 2
1 min read
Implementing Threshold Cryptography: Why We Ditched Standard PKI for MPC at SQHWYD

Implementing Threshold Cryptography: Why We Ditched Standard PKI for MPC at SQHWYD

5
Comments
2 min read
loading...