Forem

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Zero-Knowledge AI Matching: Binarized Embeddings + Hamming Distance
Cover image for Zero-Knowledge AI Matching: Binarized Embeddings + Hamming Distance

Zero-Knowledge AI Matching: Binarized Embeddings + Hamming Distance

1
Comments
5 min read
I scanned popular open source projects for quantum-vulnerable crypto. Here's what I found.

I scanned popular open source projects for quantum-vulnerable crypto. Here's what I found.

Comments
3 min read
Cardsharing Protocol Deep Dive: Understanding DVB Decryption and Network Key Distribution

Cardsharing Protocol Deep Dive: Understanding DVB Decryption and Network Key Distribution

Comments
3 min read
From WannaCry to Building My Own Ransomware Lab: A Defensive Cybersecurity Journey

From WannaCry to Building My Own Ransomware Lab: A Defensive Cybersecurity Journey

Comments
3 min read
Forensic Architecture of a Scam: Deconstructing the BTDUex Fake Crypto Exchange

Forensic Architecture of a Scam: Deconstructing the BTDUex Fake Crypto Exchange

Comments
3 min read
NIP-04 Encryption in Python — The Complete Guide

NIP-04 Encryption in Python — The Complete Guide

Comments
2 min read
Post-Quantum TLS Signatures Increase Handshake Size: Solutions to Mitigate Performance and Compatibility Issues

Post-Quantum TLS Signatures Increase Handshake Size: Solutions to Mitigate Performance and Compatibility Issues

Comments
13 min read
Building AI's Flight Recorder: How VCP v1.1 Would Have Made the CME Outage Auditable (With Code)
Cover image for Building AI's Flight Recorder: How VCP v1.1 Would Have Made the CME Outage Auditable (With Code)

Building AI's Flight Recorder: How VCP v1.1 Would Have Made the CME Outage Auditable (With Code)

Comments
15 min read
How to Hash Passwords in Python and Encrypt Sensitive Data the Right Way
Cover image for How to Hash Passwords in Python and Encrypt Sensitive Data the Right Way

How to Hash Passwords in Python and Encrypt Sensitive Data the Right Way

1
Comments
8 min read
How to Decrypt Nostr DMs (NIP-04) in Pure Python — No Libraries Needed

How to Decrypt Nostr DMs (NIP-04) in Pure Python — No Libraries Needed

Comments
2 min read
ZkPatternMatcher: A Practical Security Scanner for ZK Circuits
Cover image for ZkPatternMatcher: A Practical Security Scanner for ZK Circuits

ZkPatternMatcher: A Practical Security Scanner for ZK Circuits

1
Comments
1 min read
The Super-Tree: How One Merkle Tree Proves Another

The Super-Tree: How One Merkle Tree Proves Another

2
Comments
9 min read
Cryptographic Hashing: Why SHA, bcrypt, and Argon2 Exist

Cryptographic Hashing: Why SHA, bcrypt, and Argon2 Exist

Comments
3 min read
Hash Functions Explained: MD5, SHA-256, SHA-512 for Developers

Hash Functions Explained: MD5, SHA-256, SHA-512 for Developers

Comments
2 min read
HSIP - Multi-tenant cryptographic consent API in Rust
Cover image for HSIP - Multi-tenant cryptographic consent API in Rust

HSIP - Multi-tenant cryptographic consent API in Rust

Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.