Forem

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Enterprise Blockchain Patterns in TypeScript: Real Case Studies, Protocol Adapters & Post-Quantum Security
Cover image for Enterprise Blockchain Patterns in TypeScript: Real Case Studies, Protocol Adapters & Post-Quantum Security

Enterprise Blockchain Patterns in TypeScript: Real Case Studies, Protocol Adapters & Post-Quantum Security

3
Comments
3 min read
SSH Keys in 2024: Why Ed25519 Replaced RSA as the Default
Cover image for SSH Keys in 2024: Why Ed25519 Replaced RSA as the Default

SSH Keys in 2024: Why Ed25519 Replaced RSA as the Default

Comments
2 min read
The Math Behind RSA #3: Implementing RSA from Scratch in Python

The Math Behind RSA #3: Implementing RSA from Scratch in Python

Comments
7 min read
VCP v1.1: Building a Flight Recorder for the SaaSpocalypse — Three-Layer Cryptographic Audit Trails for Algorithmic Trading
Cover image for VCP v1.1: Building a Flight Recorder for the SaaSpocalypse — Three-Layer Cryptographic Audit Trails for Algorithmic Trading

VCP v1.1: Building a Flight Recorder for the SaaSpocalypse — Three-Layer Cryptographic Audit Trails for Algorithmic Trading

Comments
12 min read
Reconstructing the SaaSpocalypse in Code: What VCP v1.1 Audit Trails Would Have Captured
Cover image for Reconstructing the SaaSpocalypse in Code: What VCP v1.1 Audit Trails Would Have Captured

Reconstructing the SaaSpocalypse in Code: What VCP v1.1 Audit Trails Would Have Captured

1
Comments
13 min read
Zero-Knowledge Privacy on Stellar: A Developer's Guide

Zero-Knowledge Privacy on Stellar: A Developer's Guide

Comments
2 min read
10 Common Misconceptions About ZK SNARKs

10 Common Misconceptions About ZK SNARKs

Comments
2 min read
Preparing for Quantum Computers That May or May Not Exist
Cover image for Preparing for Quantum Computers That May or May Not Exist

Preparing for Quantum Computers That May or May Not Exist

Comments
7 min read
AES Cipher Encryption & Decryption with Example

AES Cipher Encryption & Decryption with Example

Comments
15 min read
The Math Behind RSA #2: Modular Arithmetic — When Clock Math Becomes Cryptography

The Math Behind RSA #2: Modular Arithmetic — When Clock Math Becomes Cryptography

Comments
8 min read
Building Authentication Without Collecting Any Personal Data

Building Authentication Without Collecting Any Personal Data

1
Comments
5 min read
How We Built a Cryptographic Provenance Protocol for AI Agents
Cover image for How We Built a Cryptographic Provenance Protocol for AI Agents

How We Built a Cryptographic Provenance Protocol for AI Agents

Comments
3 min read
The Math Behind RSA #1: Primes and Prime Factorization

The Math Behind RSA #1: Primes and Prime Factorization

Comments
7 min read
Cryptography Fundamentals: How Your Data Stays Secret in 2026
Cover image for Cryptography Fundamentals: How Your Data Stays Secret in 2026

Cryptography Fundamentals: How Your Data Stays Secret in 2026

Comments
8 min read
Building an SM4 Encryption-Decryption Utility in ArkTS (SM4_128, PKCS7, CBC & GCM Tips)

Building an SM4 Encryption-Decryption Utility in ArkTS (SM4_128, PKCS7, CBC & GCM Tips)

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.