Forem

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Engineering the Nexus Release: How I Built Secure E2EE Network Sync into a Linux Clipboard Manager (v1.5.1)
Cover image for Engineering the Nexus Release: How I Built Secure E2EE Network Sync into a Linux Clipboard Manager (v1.5.1)

Engineering the Nexus Release: How I Built Secure E2EE Network Sync into a Linux Clipboard Manager (v1.5.1)

Comments
9 min read
Classical Ciphers With Chi-Squared Frequency Analysis for Auto-Decryption

Classical Ciphers With Chi-Squared Frequency Analysis for Auto-Decryption

Comments
3 min read
[x509Lab]Generating Ed25519 Certificate Chains in the Browser (No Server Required)

[x509Lab]Generating Ed25519 Certificate Chains in the Browser (No Server Required)

Comments
2 min read
# I Replaced a $100K Security Audit with a CI Pipeline — And It Caught More Bugs

# I Replaced a $100K Security Audit with a CI Pipeline — And It Caught More Bugs

Comments
5 min read
QRVA: A protocol for cryptographic verification of physical QR codes — design decisions and open questions

QRVA: A protocol for cryptographic verification of physical QR codes — design decisions and open questions

Comments
11 min read
Lagrange interpolation: turning points into a polynomial
Cover image for Lagrange interpolation: turning points into a polynomial

Lagrange interpolation: turning points into a polynomial

Comments
6 min read
How we built zero-knowledge end-to-end encryption for a mobile AI coding agent companion

How we built zero-knowledge end-to-end encryption for a mobile AI coding agent companion

Comments
12 min read
Tried to buy a pint, Finding a Trojan: My First Malware Analysis

Tried to buy a pint, Finding a Trojan: My First Malware Analysis

Comments
7 min read
Digital signatures: Schnorr, ECDSA and how PS3 was hacked
Cover image for Digital signatures: Schnorr, ECDSA and how PS3 was hacked

Digital signatures: Schnorr, ECDSA and how PS3 was hacked

Comments
9 min read
Animated Cryptographic QR Codes: Killing Screenshot Attacks at the Display Layer
Cover image for Animated Cryptographic QR Codes: Killing Screenshot Attacks at the Display Layer

Animated Cryptographic QR Codes: Killing Screenshot Attacks at the Display Layer

Comments
5 min read
Private keys and elliptic curves: a deep-dive for people who don't like math
Cover image for Private keys and elliptic curves: a deep-dive for people who don't like math

Private keys and elliptic curves: a deep-dive for people who don't like math

Comments
7 min read
How to Prepare Your TLS Stack for Post-Quantum Cryptography Today
Cover image for How to Prepare Your TLS Stack for Post-Quantum Cryptography Today

How to Prepare Your TLS Stack for Post-Quantum Cryptography Today

Comments
5 min read
The 2029 Deadline Nobody Building Agent Infrastructure Is Talking About

The 2029 Deadline Nobody Building Agent Infrastructure Is Talking About

Comments
5 min read
A Post-Quantum Hybrid Encryption for High-Load Systems in TypeScript
Cover image for A Post-Quantum Hybrid Encryption for High-Load Systems in TypeScript

A Post-Quantum Hybrid Encryption for High-Load Systems in TypeScript

2
Comments
7 min read
P-256 vs 3DES: Why the Next Card Network Won't Use Visa's Crypto

P-256 vs 3DES: Why the Next Card Network Won't Use Visa's Crypto

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.