DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
HKDF: Turning One Secret Into Many, Correctly

HKDF: Turning One Secret Into Many, Correctly

Comments
6 min read
Fourteen free engineering ebooks on sovereign AI

Fourteen free engineering ebooks on sovereign AI

Comments
3 min read
⚡ Flash512-Vanguard: Military-Grade Encryption for Python (AES-256-GCM + Argon2id + SecureBuffer)

⚡ Flash512-Vanguard: Military-Grade Encryption for Python (AES-256-GCM + Argon2id + SecureBuffer)

Comments
2 min read
Encryption Protocols for Secure AI Systems: A Practical Guide

Encryption Protocols for Secure AI Systems: A Practical Guide

7
Comments
11 min read
EU Chat Control: What Client-Side Scanning Actually Means for Encryption

EU Chat Control: What Client-Side Scanning Actually Means for Encryption

Comments
4 min read
Ghost Signature: Cryptographic Receipts for AI Output (Ed25519 + JWKS)

Ghost Signature: Cryptographic Receipts for AI Output (Ed25519 + JWKS)

Comments
3 min read
Proving Your AI Agent Made Its Own Decisions

Proving Your AI Agent Made Its Own Decisions

Comments
4 min read
Code Signing and Sigstore: How Software Supply Chain Integrity Works

Code Signing and Sigstore: How Software Supply Chain Integrity Works

Comments
6 min read
Show dev.to: I launched Quldra - a post-quantum, single-device Signal alternative

Show dev.to: I launched Quldra - a post-quantum, single-device Signal alternative

1
Comments
5 min read
Matrix: The Open Protocol for Federated Encrypted Messaging

Matrix: The Open Protocol for Federated Encrypted Messaging

Comments
6 min read
Cold Boot Attacks: Why Disk Encryption Doesn't Protect a Running Computer

Cold Boot Attacks: Why Disk Encryption Doesn't Protect a Running Computer

Comments
4 min read
Building an Experimental TypeScript Cipher Inspired by 8 Dimensions

Building an Experimental TypeScript Cipher Inspired by 8 Dimensions

Comments
8 min read
Post-Quantum Cryptography: What Happens to Your Encrypted Data When Quantum Arrives

Post-Quantum Cryptography: What Happens to Your Encrypted Data When Quantum Arrives

Comments
5 min read
MD5 is broken - here is what to use instead

MD5 is broken - here is what to use instead

Comments
3 min read
Reproducible Builds: The Only Way to Verify Your Software Wasn't Tampered With

Reproducible Builds: The Only Way to Verify Your Software Wasn't Tampered With

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.