DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Signal Double Ratchet Algorithm, Explained

The Signal Double Ratchet Algorithm, Explained

Comments
6 min read
HKDF: Turning One Secret Into Many, Correctly

HKDF: Turning One Secret Into Many, Correctly

Comments
6 min read
Fourteen free engineering ebooks on sovereign AI

Fourteen free engineering ebooks on sovereign AI

Comments
3 min read
⚡ Flash512-Vanguard: Military-Grade Encryption for Python (AES-256-GCM + Argon2id + SecureBuffer)

⚡ Flash512-Vanguard: Military-Grade Encryption for Python (AES-256-GCM + Argon2id + SecureBuffer)

Comments
2 min read
Encryption Protocols for Secure AI Systems: A Practical Guide

Encryption Protocols for Secure AI Systems: A Practical Guide

7
Comments
11 min read
EU Chat Control: What Client-Side Scanning Actually Means for Encryption

EU Chat Control: What Client-Side Scanning Actually Means for Encryption

Comments
4 min read
Ghost Signature: Cryptographic Receipts for AI Output (Ed25519 + JWKS)

Ghost Signature: Cryptographic Receipts for AI Output (Ed25519 + JWKS)

Comments
3 min read
Proving Your AI Agent Made Its Own Decisions

Proving Your AI Agent Made Its Own Decisions

Comments
4 min read
Code Signing and Sigstore: How Software Supply Chain Integrity Works

Code Signing and Sigstore: How Software Supply Chain Integrity Works

Comments
6 min read
Show dev.to: I launched Quldra - a post-quantum, single-device Signal alternative

Show dev.to: I launched Quldra - a post-quantum, single-device Signal alternative

1
Comments
5 min read
Matrix: The Open Protocol for Federated Encrypted Messaging

Matrix: The Open Protocol for Federated Encrypted Messaging

Comments
6 min read
Cold Boot Attacks: Why Disk Encryption Doesn't Protect a Running Computer

Cold Boot Attacks: Why Disk Encryption Doesn't Protect a Running Computer

Comments
4 min read
Building an Experimental TypeScript Cipher Inspired by 8 Dimensions

Building an Experimental TypeScript Cipher Inspired by 8 Dimensions

Comments
8 min read
Post-Quantum Cryptography: What Happens to Your Encrypted Data When Quantum Arrives

Post-Quantum Cryptography: What Happens to Your Encrypted Data When Quantum Arrives

Comments
5 min read
MD5 is broken - here is what to use instead

MD5 is broken - here is what to use instead

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.