close

DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How We Use Ed25519 Signatures to Give Users Cryptographic Proof Before They Send Crypto

How We Use Ed25519 Signatures to Give Users Cryptographic Proof Before They Send Crypto

Image 1
Comments
5 min read
Crack the Power picoCTF Writeup

Crack the Power picoCTF Writeup

Comments
3 min read
Mini RSA picoCTF Writeup

Mini RSA picoCTF Writeup

Comments
9 min read
Why Can We Use "Shorter" Keys?: Key Length vs Security Bits, the Real Story

Why Can We Use "Shorter" Keys?: Key Length vs Security Bits, the Real Story

Comments
11 min read
Post-Quantum Security Is an Infrastructure Problem, Not a Future Upgrade

Post-Quantum Security Is an Infrastructure Problem, Not a Future Upgrade

Comments 1
3 min read
Post-Quantum Security Is Not Just About Algorithms. It’s About Systems.

Post-Quantum Security Is Not Just About Algorithms. It’s About Systems.

Comments
3 min read
I Built a PQC Native L1 Blockchain from Scratch in 9 Months

I Built a PQC Native L1 Blockchain from Scratch in 9 Months

Comments
2 min read
The Blindfold That Sees

The Blindfold That Sees

Comments
6 min read
Engineering the Nexus Release: How I Built Secure E2EE Network Sync into a Linux Clipboard Manager (v1.5.1)

Engineering the Nexus Release: How I Built Secure E2EE Network Sync into a Linux Clipboard Manager (v1.5.1)

Comments
9 min read
Classical Ciphers With Chi-Squared Frequency Analysis for Auto-Decryption

Classical Ciphers With Chi-Squared Frequency Analysis for Auto-Decryption

Comments
3 min read
[x509Lab]Generating Ed25519 Certificate Chains in the Browser (No Server Required)

[x509Lab]Generating Ed25519 Certificate Chains in the Browser (No Server Required)

Comments
2 min read
# I Replaced a $100K Security Audit with a CI Pipeline — And It Caught More Bugs

# I Replaced a $100K Security Audit with a CI Pipeline — And It Caught More Bugs

Comments
5 min read
QRVA: A protocol for cryptographic verification of physical QR codes — design decisions and open questions

QRVA: A protocol for cryptographic verification of physical QR codes — design decisions and open questions

Comments
11 min read
Lagrange interpolation: turning points into a polynomial

Lagrange interpolation: turning points into a polynomial

Comments
6 min read
Digital signatures: Schnorr, ECDSA and how PS3 was hacked

Digital signatures: Schnorr, ECDSA and how PS3 was hacked

Comments
9 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.