DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Lagrange interpolation: turning points into a polynomial

Lagrange interpolation: turning points into a polynomial

Comments
6 min read
Digital signatures: Schnorr, ECDSA and how PS3 was hacked

Digital signatures: Schnorr, ECDSA and how PS3 was hacked

Comments
9 min read
Animated Cryptographic QR Codes: Killing Screenshot Attacks at the Display Layer

Animated Cryptographic QR Codes: Killing Screenshot Attacks at the Display Layer

Comments
5 min read
Private keys and elliptic curves: a deep-dive for people who don't like math

Private keys and elliptic curves: a deep-dive for people who don't like math

Comments
7 min read
How to Prepare Your TLS Stack for Post-Quantum Cryptography Today

How to Prepare Your TLS Stack for Post-Quantum Cryptography Today

Comments
5 min read
The 2029 Deadline Nobody Building Agent Infrastructure Is Talking About

The 2029 Deadline Nobody Building Agent Infrastructure Is Talking About

Comments
5 min read
A Post-Quantum Hybrid Encryption for High-Load Systems in TypeScript

A Post-Quantum Hybrid Encryption for High-Load Systems in TypeScript

2
Comments
7 min read
P-256 vs 3DES: Why the Next Card Network Won't Use Visa's Crypto

P-256 vs 3DES: Why the Next Card Network Won't Use Visa's Crypto

Comments
2 min read
HMAC-SHA256 in Practice: How Crypto Casinos Generate Provably Fair Game Outcomes

HMAC-SHA256 in Practice: How Crypto Casinos Generate Provably Fair Game Outcomes

Comments
3 min read
🔐 AES-256 Finally Makes Sense (And It’s Way Simpler Than You Think)

🔐 AES-256 Finally Makes Sense (And It’s Way Simpler Than You Think)

Comments
2 min read
Implementing ECDSA from Scratch Without Libraries

Implementing ECDSA from Scratch Without Libraries

Comments
12 min read
MPC in TypeScript: Private Computation That Actually Runs

MPC in TypeScript: Private Computation That Actually Runs

Comments
7 min read
504-Bit State Space: How Three Invisible Bands Catch Forged AI Credentials

504-Bit State Space: How Three Invisible Bands Catch Forged AI Credentials

Comments
3 min read
🚀 Toqen Mobile: access in 2 steps

🚀 Toqen Mobile: access in 2 steps

4
Comments
2 min read
The Math Behind RSA #4: Breaking RSA and the Rise of Elliptic Curve Cryptography

The Math Behind RSA #4: Breaking RSA and the Rise of Elliptic Curve Cryptography

Comments
8 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.