DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
10 Questions from a ZK Meetup in Krakow

10 Questions from a ZK Meetup in Krakow

1
Comments
9 min read
Execution Traces: Packing Data for Polynomials

Execution Traces: Packing Data for Polynomials

1
Comments
8 min read
Polynomials in ZK SNARKs published: true

Polynomials in ZK SNARKs published: true

Comments
6 min read
Zero-Trust at the Edge: Rethinking the eDMZ Perimeter (Part 1)

Zero-Trust at the Edge: Rethinking the eDMZ Perimeter (Part 1)

Comments
6 min read
Harvest Now, Decrypt Later: Why Nation States Are Stealing Your Encrypted Data Today

Harvest Now, Decrypt Later: Why Nation States Are Stealing Your Encrypted Data Today

Comments
9 min read
What are Roots of Unity (and why do they matter in ZK)?

What are Roots of Unity (and why do they matter in ZK)?

Comments
13 min read
I Built a Blockchain Voting System with RSA Encryption — Here's How It Works

I Built a Blockchain Voting System with RSA Encryption — Here's How It Works

Comments
4 min read
Zero-Knowledge AI Matching: Binarized Embeddings + Hamming Distance

Zero-Knowledge AI Matching: Binarized Embeddings + Hamming Distance

1
Comments
5 min read
I scanned popular open source projects for quantum-vulnerable crypto. Here's what I found.

I scanned popular open source projects for quantum-vulnerable crypto. Here's what I found.

Comments
3 min read
Cardsharing Protocol Deep Dive: Understanding DVB Decryption and Network Key Distribution

Cardsharing Protocol Deep Dive: Understanding DVB Decryption and Network Key Distribution

Comments
3 min read
From WannaCry to Building My Own Ransomware Lab: A Defensive Cybersecurity Journey

From WannaCry to Building My Own Ransomware Lab: A Defensive Cybersecurity Journey

Comments
3 min read
Forensic Architecture of a Scam: Deconstructing the BTDUex Fake Crypto Exchange

Forensic Architecture of a Scam: Deconstructing the BTDUex Fake Crypto Exchange

Comments
3 min read
NIP-04 Encryption in Python — The Complete Guide

NIP-04 Encryption in Python — The Complete Guide

Comments
2 min read
Post-Quantum TLS Signatures Increase Handshake Size: Solutions to Mitigate Performance and Compatibility Issues

Post-Quantum TLS Signatures Increase Handshake Size: Solutions to Mitigate Performance and Compatibility Issues

Comments
13 min read
Building AI's Flight Recorder: How VCP v1.1 Would Have Made the CME Outage Auditable (With Code)

Building AI's Flight Recorder: How VCP v1.1 Would Have Made the CME Outage Auditable (With Code)

Comments
15 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.