DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Cryptographic Hashing: Why SHA, bcrypt, and Argon2 Exist

Cryptographic Hashing: Why SHA, bcrypt, and Argon2 Exist

Comments
3 min read
HSIP - Multi-tenant cryptographic consent API in Rust

HSIP - Multi-tenant cryptographic consent API in Rust

Comments
1 min read
VeraSnap Solves the Other Half: Building Cryptographic Proof of Reality in a World That Can't Detect Fakes

VeraSnap Solves the Other Half: Building Cryptographic Proof of Reality in a World That Can't Detect Fakes

1
Comments
18 min read
AGORA Oracle: Bloomberg Terminal for AI API Pricing

AGORA Oracle: Bloomberg Terminal for AI API Pricing

Comments
2 min read
Building Cryptographic Trust Infrastructure for AI Agents

Building Cryptographic Trust Infrastructure for AI Agents

2
Comments
4 min read
Zero-Knowledge Encryption: What “We Can’t See Your Data” Actually Means

Zero-Knowledge Encryption: What “We Can’t See Your Data” Actually Means

1
Comments
2 min read
Post-Quantum Cryptography for DKIM, PGP, and S/MIME

Post-Quantum Cryptography for DKIM, PGP, and S/MIME

Comments
5 min read
Custody Architecture in Distributed Financial Systems: Threshold Cryptography and Failure Containment

Custody Architecture in Distributed Financial Systems: Threshold Cryptography and Failure Containment

Comments
4 min read
I Shipped a Broken Consistency Proof Verifier. Here's How I Found Out.

I Shipped a Broken Consistency Proof Verifier. Here's How I Found Out.

Comments
9 min read
98 Bytes That Prove Your Document Existed

98 Bytes That Prove Your Document Existed

Comments
8 min read
Understanding RSA: A Simple Guide to Public-Key Math

Understanding RSA: A Simple Guide to Public-Key Math

Comments
3 min read
X.509 Beyond Trust: Weaponizing Certificate Extensibility Without Breaking TLS

X.509 Beyond Trust: Weaponizing Certificate Extensibility Without Breaking TLS

Comments
2 min read
Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps

Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps

Comments
2 min read
The First Zero-Knowledge Proof of AI Safety Judgment

The First Zero-Knowledge Proof of AI Safety Judgment

1
Comments 2
10 min read
How We Built Multi-Modal Screen Detection for Cryptographic Evidence Capture: VeraSnap

How We Built Multi-Modal Screen Detection for Cryptographic Evidence Capture: VeraSnap

Comments
16 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.