Forem

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Crypto-Shredding: How Immutable Audit Logs and GDPR Coexist

Crypto-Shredding: How Immutable Audit Logs and GDPR Coexist

Comments
4 min read
The VeritasChain Protocol: A Cryptographic Audit Standard for the Algorithmic Trading Era

The VeritasChain Protocol: A Cryptographic Audit Standard for the Algorithmic Trading Era

Comments
4 min read
AIDE Automation Framework From Integrity Checks to Self-Verification
Cover image for AIDE Automation Framework From Integrity Checks to Self-Verification

AIDE Automation Framework From Integrity Checks to Self-Verification

1
Comments
4 min read
Building a Production-Ready Blind Signature eCash System in Rust
Cover image for Building a Production-Ready Blind Signature eCash System in Rust

Building a Production-Ready Blind Signature eCash System in Rust

Comments
5 min read
Quantum Security's Blind Spot: When Eavesdroppers Fly Under the Radar by Arvind Sundararajan

Quantum Security's Blind Spot: When Eavesdroppers Fly Under the Radar by Arvind Sundararajan

Comments
2 min read
CipherMuse: The Haunted Fusion of AI, Encryption & Steganography🎃
Cover image for CipherMuse: The Haunted Fusion of AI, Encryption & Steganography🎃

CipherMuse: The Haunted Fusion of AI, Encryption & Steganography🎃

Comments
2 min read
Quantum Shadows: Can Eavesdroppers Erase Unbreakable Encryption?

Quantum Shadows: Can Eavesdroppers Erase Unbreakable Encryption?

Comments
2 min read
Dari Matematika Murni ke Enkripsi: Bagaimana G. H. Hardy Secara Tak Sengaja Menggerakkan Kriptografi Modern
Cover image for Dari Matematika Murni ke Enkripsi: Bagaimana G. H. Hardy Secara Tak Sengaja Menggerakkan Kriptografi Modern

Dari Matematika Murni ke Enkripsi: Bagaimana G. H. Hardy Secara Tak Sengaja Menggerakkan Kriptografi Modern

Comments
2 min read
Quantum Certifications: Are We Being Fooled? by Arvind Sundararajan

Quantum Certifications: Are We Being Fooled? by Arvind Sundararajan

Comments
2 min read
Quantum's Achilles Heel: How Subtle Attacks Can Blindside Security Systems by Arvind Sundararajan

Quantum's Achilles Heel: How Subtle Attacks Can Blindside Security Systems by Arvind Sundararajan

Comments
2 min read
Quantum Illusions: Can We Really Trust Our Entanglement Tests? by Arvind Sundararajan

Quantum Illusions: Can We Really Trust Our Entanglement Tests? by Arvind Sundararajan

Comments
2 min read
AIDE in Motion Automating and Signing System Integrity Checks
Cover image for AIDE in Motion Automating and Signing System Integrity Checks

AIDE in Motion Automating and Signing System Integrity Checks

Comments
5 min read
AES Algorithm for beginners

AES Algorithm for beginners

Comments
11 min read
Cryptography in 2025: The Quantum Leap and the AI Arms Race

Cryptography in 2025: The Quantum Leap and the AI Arms Race

Comments
3 min read
Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]
Cover image for Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]

Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]

Comments
4 min read
Mastering Cryptography: A Senior's Guide to Design, Attack, and Defend
Cover image for Mastering Cryptography: A Senior's Guide to Design, Attack, and Defend

Mastering Cryptography: A Senior's Guide to Design, Attack, and Defend

Comments
10 min read
Web Bot Auth: Giving Bots a Crypto ID Card in a World of Fakes
Cover image for Web Bot Auth: Giving Bots a Crypto ID Card in a World of Fakes

Web Bot Auth: Giving Bots a Crypto ID Card in a World of Fakes

4
Comments
9 min read
Top 10 Modern Cryptography Practices for Secure P2P Chat (2025–2026)

Top 10 Modern Cryptography Practices for Secure P2P Chat (2025–2026)

Comments
3 min read
Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

1
Comments
4 min read
How Does Digital Trust Actually Work? A Deep Dive into the Science of Secrecy
Cover image for How Does Digital Trust Actually Work? A Deep Dive into the Science of Secrecy

How Does Digital Trust Actually Work? A Deep Dive into the Science of Secrecy

Comments
8 min read
Secure Remote Password (SRP) protocol
Cover image for Secure Remote Password (SRP) protocol

Secure Remote Password (SRP) protocol

3
Comments
14 min read
Cracking Codes (and Scheduling Conflicts): My Intro to Cryptography with the ZK Bootcamp
Cover image for Cracking Codes (and Scheduling Conflicts): My Intro to Cryptography with the ZK Bootcamp

Cracking Codes (and Scheduling Conflicts): My Intro to Cryptography with the ZK Bootcamp

2
Comments
3 min read
Cryptography for developers
Cover image for Cryptography for developers

Cryptography for developers

2
Comments
3 min read
Bracing for Breakers: Quantum-Safe Crypto for the Real World

Bracing for Breakers: Quantum-Safe Crypto for the Real World

Comments
2 min read
Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Comments
2 min read
loading...