Forem

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Tried to buy a pint, Finding a Trojan: My First Malware Analysis

Tried to buy a pint, Finding a Trojan: My First Malware Analysis

Comments
7 min read
Digital signatures: Schnorr, ECDSA and how PS3 was hacked
Cover image for Digital signatures: Schnorr, ECDSA and how PS3 was hacked

Digital signatures: Schnorr, ECDSA and how PS3 was hacked

Comments
9 min read
Animated Cryptographic QR Codes: Killing Screenshot Attacks at the Display Layer
Cover image for Animated Cryptographic QR Codes: Killing Screenshot Attacks at the Display Layer

Animated Cryptographic QR Codes: Killing Screenshot Attacks at the Display Layer

Comments
5 min read
Private keys and elliptic curves: a deep-dive for people who don't like math
Cover image for Private keys and elliptic curves: a deep-dive for people who don't like math

Private keys and elliptic curves: a deep-dive for people who don't like math

Comments
7 min read
How to Prepare Your TLS Stack for Post-Quantum Cryptography Today
Cover image for How to Prepare Your TLS Stack for Post-Quantum Cryptography Today

How to Prepare Your TLS Stack for Post-Quantum Cryptography Today

Comments
5 min read
The 2029 Deadline Nobody Building Agent Infrastructure Is Talking About

The 2029 Deadline Nobody Building Agent Infrastructure Is Talking About

Comments
5 min read
A Post-Quantum Hybrid Encryption for High-Load Systems in TypeScript
Cover image for A Post-Quantum Hybrid Encryption for High-Load Systems in TypeScript

A Post-Quantum Hybrid Encryption for High-Load Systems in TypeScript

2
Comments
7 min read
P-256 vs 3DES: Why the Next Card Network Won't Use Visa's Crypto

P-256 vs 3DES: Why the Next Card Network Won't Use Visa's Crypto

Comments
2 min read
HMAC-SHA256 in Practice: How Crypto Casinos Generate Provably Fair Game Outcomes

HMAC-SHA256 in Practice: How Crypto Casinos Generate Provably Fair Game Outcomes

Comments
3 min read
🔐 AES-256 Finally Makes Sense (And It’s Way Simpler Than You Think)
Cover image for 🔐 AES-256 Finally Makes Sense (And It’s Way Simpler Than You Think)

🔐 AES-256 Finally Makes Sense (And It’s Way Simpler Than You Think)

Comments
2 min read
Implementing ECDSA from Scratch Without Libraries

Implementing ECDSA from Scratch Without Libraries

Comments
12 min read
MPC in TypeScript: Private Computation That Actually Runs
Cover image for MPC in TypeScript: Private Computation That Actually Runs

MPC in TypeScript: Private Computation That Actually Runs

Comments
7 min read
504-Bit State Space: How Three Invisible Bands Catch Forged AI Credentials

504-Bit State Space: How Three Invisible Bands Catch Forged AI Credentials

Comments
3 min read
🚀 Toqen Mobile: access in 2 steps
Cover image for 🚀 Toqen Mobile: access in 2 steps

🚀 Toqen Mobile: access in 2 steps

4
Comments
2 min read
The Math Behind RSA #4: Breaking RSA and the Rise of Elliptic Curve Cryptography

The Math Behind RSA #4: Breaking RSA and the Rise of Elliptic Curve Cryptography

Comments
8 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.