DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
FHE programs have precision bugs random testing can't find — here's an adversarial search tool that does

FHE programs have precision bugs random testing can't find — here's an adversarial search tool that does

Comments
3 min read
I Built a PQC Native L1 Blockchain from Scratch in 9 Months

I Built a PQC Native L1 Blockchain from Scratch in 9 Months

Comments
2 min read
The Blindfold That Sees

The Blindfold That Sees

Comments
6 min read
Themis: Serious Cryptography Without Losing Your Mind

Themis: Serious Cryptography Without Losing Your Mind

Comments
5 min read
Engineering the Nexus Release: How I Built Secure E2EE Network Sync into a Linux Clipboard Manager (v1.5.1)

Engineering the Nexus Release: How I Built Secure E2EE Network Sync into a Linux Clipboard Manager (v1.5.1)

Comments
9 min read
Classical Ciphers With Chi-Squared Frequency Analysis for Auto-Decryption

Classical Ciphers With Chi-Squared Frequency Analysis for Auto-Decryption

Comments
3 min read
[x509Lab]Generating Ed25519 Certificate Chains in the Browser (No Server Required)

[x509Lab]Generating Ed25519 Certificate Chains in the Browser (No Server Required)

Comments
2 min read
# I Replaced a $100K Security Audit with a CI Pipeline — And It Caught More Bugs

# I Replaced a $100K Security Audit with a CI Pipeline — And It Caught More Bugs

Comments
5 min read
QRVA: A protocol for cryptographic verification of physical QR codes — design decisions and open questions

QRVA: A protocol for cryptographic verification of physical QR codes — design decisions and open questions

Comments
11 min read
Lagrange interpolation: turning points into a polynomial

Lagrange interpolation: turning points into a polynomial

Comments
6 min read
Digital signatures: Schnorr, ECDSA and how PS3 was hacked

Digital signatures: Schnorr, ECDSA and how PS3 was hacked

Comments
9 min read
Animated Cryptographic QR Codes: Killing Screenshot Attacks at the Display Layer

Animated Cryptographic QR Codes: Killing Screenshot Attacks at the Display Layer

Comments
5 min read
Private keys and elliptic curves: a deep-dive for people who don't like math

Private keys and elliptic curves: a deep-dive for people who don't like math

Comments
7 min read
How to Prepare Your TLS Stack for Post-Quantum Cryptography Today

How to Prepare Your TLS Stack for Post-Quantum Cryptography Today

Comments
5 min read
The 2029 Deadline Nobody Building Agent Infrastructure Is Talking About

The 2029 Deadline Nobody Building Agent Infrastructure Is Talking About

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.