DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Diffie-Hellman Key Exchange Explained: Sharing a Secret in Public

Diffie-Hellman Key Exchange Explained: Sharing a Secret in Public

Comments
4 min read
Digital Signatures: The “Trust Me Bro” Detector for Junior Cybersecurity Engineers

Digital Signatures: The “Trust Me Bro” Detector for Junior Cybersecurity Engineers

Comments
7 min read
ML-KEM Is Already In Your Browser. Here's How It Actually Works.

ML-KEM Is Already In Your Browser. Here's How It Actually Works.

Comments
1 min read
JWT Is Not Quantum-Safe — So I Built a Library That Is

JWT Is Not Quantum-Safe — So I Built a Library That Is

Comments
5 min read
The Signal Double Ratchet Algorithm, Explained

The Signal Double Ratchet Algorithm, Explained

Comments
6 min read
OPAQUE: Password Authentication That Never Sends the Password

OPAQUE: Password Authentication That Never Sends the Password

1
Comments
5 min read
HKDF: Turning One Secret Into Many, Correctly

HKDF: Turning One Secret Into Many, Correctly

Comments
6 min read
Fourteen free engineering ebooks on sovereign AI

Fourteen free engineering ebooks on sovereign AI

Comments
3 min read
⚡ Flash512-Vanguard: Military-Grade Encryption for Python (AES-256-GCM + Argon2id + SecureBuffer)

⚡ Flash512-Vanguard: Military-Grade Encryption for Python (AES-256-GCM + Argon2id + SecureBuffer)

Comments
2 min read
Encryption Protocols for Secure AI Systems: A Practical Guide

Encryption Protocols for Secure AI Systems: A Practical Guide

7
Comments
11 min read
EU Chat Control: What Client-Side Scanning Actually Means for Encryption

EU Chat Control: What Client-Side Scanning Actually Means for Encryption

Comments
4 min read
Ghost Signature: Cryptographic Receipts for AI Output (Ed25519 + JWKS)

Ghost Signature: Cryptographic Receipts for AI Output (Ed25519 + JWKS)

Comments
3 min read
Proving Your AI Agent Made Its Own Decisions

Proving Your AI Agent Made Its Own Decisions

Comments
4 min read
Code Signing and Sigstore: How Software Supply Chain Integrity Works

Code Signing and Sigstore: How Software Supply Chain Integrity Works

Comments
6 min read
Show dev.to: I launched Quldra - a post-quantum, single-device Signal alternative

Show dev.to: I launched Quldra - a post-quantum, single-device Signal alternative

1
Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.