DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Web Bot Auth: Giving Bots a Crypto ID Card in a World of Fakes

Web Bot Auth: Giving Bots a Crypto ID Card in a World of Fakes

4
Comments
9 min read
Top 10 Modern Cryptography Practices for Secure P2P Chat (2025–2026)

Top 10 Modern Cryptography Practices for Secure P2P Chat (2025–2026)

Comments
3 min read
Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Comments
2 min read
Quantum Dawn: Hardening Our Networks Before the Storm

Quantum Dawn: Hardening Our Networks Before the Storm

Comments
2 min read
Bracing for Breakers: Quantum-Safe Crypto for the Real World

Bracing for Breakers: Quantum-Safe Crypto for the Real World

Comments
2 min read
Secure Remote Password (SRP) protocol

Secure Remote Password (SRP) protocol

5
Comments
14 min read
Cracking Codes (and Scheduling Conflicts): My Intro to Cryptography with the ZK Bootcamp

Cracking Codes (and Scheduling Conflicts): My Intro to Cryptography with the ZK Bootcamp

2
Comments
3 min read
Cryptography for developers

Cryptography for developers

2
Comments
3 min read
Generate Strong, Reproducible Passwords with Patterns & Grids

Generate Strong, Reproducible Passwords with Patterns & Grids

Comments
1 min read
Merkle Trees in SQLite with Python: A Practical Tutorial

Merkle Trees in SQLite with Python: A Practical Tutorial

Comments
6 min read
Vulnerability Remediation (Cybersecurity Patch) by Strengthening Cryptography & Data Protection (OWASP A02)

Vulnerability Remediation (Cybersecurity Patch) by Strengthening Cryptography & Data Protection (OWASP A02)

6
Comments
3 min read
Enigma Machine : How a step on its rotor change the mapping

Enigma Machine : How a step on its rotor change the mapping

Comments
2 min read
The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan

The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan

Comments
2 min read
The Invisible Guardian: Zero-Knowledge Watermarks for AI-Generated Images

The Invisible Guardian: Zero-Knowledge Watermarks for AI-Generated Images

Comments
2 min read
A Medium-Rare Brain Understanding the Essential Tools of Modern Cryptography Part 1

A Medium-Rare Brain Understanding the Essential Tools of Modern Cryptography Part 1

3
Comments 1
3 min read
Unlock Personalization Without the Privacy Price: Encrypted Recommendations Are Here

Unlock Personalization Without the Privacy Price: Encrypted Recommendations Are Here

1
Comments
2 min read
How RSA Works (for Dummies)

How RSA Works (for Dummies)

3
Comments 2
4 min read
Beyond Checksums: Securing File Transfers with HMAC-SHA256

Beyond Checksums: Securing File Transfers with HMAC-SHA256

Comments
3 min read
How Does Public Key Cryptography Work?

How Does Public Key Cryptography Work?

Comments
3 min read
How to decrypt broken GCM ciphertext

How to decrypt broken GCM ciphertext

1
Comments
4 min read
🔐 What if the key to a secret was held by many, not one?

🔐 What if the key to a secret was held by many, not one?

Comments
1 min read
An Encryption Algorithm

An Encryption Algorithm

Comments
2 min read
Petoron Quantum Standard (PQS)

Petoron Quantum Standard (PQS)

Comments
1 min read
Petoron Local Destroyer (PLD)

Petoron Local Destroyer (PLD)

Comments
1 min read
TraplessPKE — A New Direction for Post-Quantum Cryptography

TraplessPKE — A New Direction for Post-Quantum Cryptography

Comments
2 min read
loading...