DEV Community

# cryptography

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Beyond Checksums: Securing File Transfers with HMAC-SHA256

Beyond Checksums: Securing File Transfers with HMAC-SHA256

Comments
3 min read
🔐 What if the key to a secret was held by many, not one?

🔐 What if the key to a secret was held by many, not one?

Comments
1 min read
An Encryption Algorithm

An Encryption Algorithm

Comments
2 min read
Petoron Quantum Standard (PQS)

Petoron Quantum Standard (PQS)

Comments
1 min read
Petoron Local Destroyer (PLD)

Petoron Local Destroyer (PLD)

Comments
1 min read
TraplessPKE — A New Direction for Post-Quantum Cryptography

TraplessPKE — A New Direction for Post-Quantum Cryptography

Comments
2 min read
🔐 Building Quantum-Resistant ZKP: A Developer's Journey into Post-Quantum Cryptography

🔐 Building Quantum-Resistant ZKP: A Developer's Journey into Post-Quantum Cryptography

Comments
5 min read
CantorCipher: A Personal Encryption Project Inspired by Cantor’s Diagonal Argument

CantorCipher: A Personal Encryption Project Inspired by Cantor’s Diagonal Argument

1
Comments
2 min read
🚀 Bitcoin, Quantum Computing & The Next Cyber War — What Devs Should Know

🚀 Bitcoin, Quantum Computing & The Next Cyber War — What Devs Should Know

1
Comments
3 min read
Symmetric vs Asymmetric Encryption — Lessons from the Field

Symmetric vs Asymmetric Encryption — Lessons from the Field

Comments
2 min read
Cryptographic Implementation Flaws: Modern Encryption Analysis

Cryptographic Implementation Flaws: Modern Encryption Analysis

1
Comments
3 min read
How to Build a Secure Node.js Application with Cryptography Best Practices

How to Build a Secure Node.js Application with Cryptography Best Practices

Comments
3 min read
Implement AES-256 Encryption and Decryption in C#: A Beginner-Friendly Guide

Implement AES-256 Encryption and Decryption in C#: A Beginner-Friendly Guide

2
Comments
3 min read
Post-Quantum Cryptography 2025: Latest Developments and Why It Matters

Post-Quantum Cryptography 2025: Latest Developments and Why It Matters

1
Comments
5 min read
I got 99 problems, but a breach ain’t one

I got 99 problems, but a breach ain’t one

1
Comments
5 min read
Symmetric vs Asymmetric Encryption — Lessons from the Field

Symmetric vs Asymmetric Encryption — Lessons from the Field

1
Comments
2 min read
CryptX: Your Pocket-Sized Cryptography Playground!

CryptX: Your Pocket-Sized Cryptography Playground!

Comments
3 min read
🔗 Consensus Algorithms in Blockchain: A Developer-Focused Guide

🔗 Consensus Algorithms in Blockchain: A Developer-Focused Guide

Comments 1
1 min read
TLSNotary ― Flow Overview

TLSNotary ― Flow Overview

Comments
2 min read
🔐 Are Your Passwords Ready for the Quantum Age?

🔐 Are Your Passwords Ready for the Quantum Age?

1
Comments
2 min read
From Traditional Encryption to Post-Quantum Solutions: Evolving Cryptography for Modern Networks

From Traditional Encryption to Post-Quantum Solutions: Evolving Cryptography for Modern Networks

Comments
9 min read
How to Implement Argon2 for Secure Password Hashing in Go

How to Implement Argon2 for Secure Password Hashing in Go

5
Comments 1
7 min read
Python, JavaScript, and Solidity: Learning Programming Languages for Ethereum Development

Python, JavaScript, and Solidity: Learning Programming Languages for Ethereum Development

Comments
7 min read
How to Prove Future Claims: A Guide to Cryptographic Foreshadowing

How to Prove Future Claims: A Guide to Cryptographic Foreshadowing

Comments
3 min read
Specter-AAL

Specter-AAL

3
Comments
2 min read
loading...