Forem

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
A Medium-Rare Brain Understanding the Essential Tools of Modern Cryptography Part 1
Cover image for A Medium-Rare Brain Understanding the Essential Tools of Modern Cryptography Part 1

A Medium-Rare Brain Understanding the Essential Tools of Modern Cryptography Part 1

2
Comments 1
3 min read
Cracking Codes (and Scheduling Conflicts): My Intro to Cryptography with the ZK Bootcamp
Cover image for Cracking Codes (and Scheduling Conflicts): My Intro to Cryptography with the ZK Bootcamp

Cracking Codes (and Scheduling Conflicts): My Intro to Cryptography with the ZK Bootcamp

2
Comments
3 min read
Generate Strong, Reproducible Passwords with Patterns & Grids

Generate Strong, Reproducible Passwords with Patterns & Grids

Comments
1 min read
Merkle Trees in SQLite with Python: A Practical Tutorial

Merkle Trees in SQLite with Python: A Practical Tutorial

Comments
6 min read
picoCTF flags writeup

picoCTF flags writeup

1
Comments
1 min read
Enigma Machine : How a step on its rotor change the mapping

Enigma Machine : How a step on its rotor change the mapping

Comments
2 min read
The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan

The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan

Comments
2 min read
The Invisible Guardian: Zero-Knowledge Watermarks for AI-Generated Images

The Invisible Guardian: Zero-Knowledge Watermarks for AI-Generated Images

Comments
2 min read
Unlock Personalization Without the Privacy Price: Encrypted Recommendations Are Here

Unlock Personalization Without the Privacy Price: Encrypted Recommendations Are Here

1
Comments
2 min read
Beyond Checksums: Securing File Transfers with HMAC-SHA256
Cover image for Beyond Checksums: Securing File Transfers with HMAC-SHA256

Beyond Checksums: Securing File Transfers with HMAC-SHA256

Comments
3 min read
How Does Public Key Cryptography Work?
Cover image for How Does Public Key Cryptography Work?

How Does Public Key Cryptography Work?

Comments
3 min read
How to decrypt broken GCM ciphertext

How to decrypt broken GCM ciphertext

4
Comments
4 min read
🔐 What if the key to a secret was held by many, not one?

🔐 What if the key to a secret was held by many, not one?

Comments
1 min read
picoCTF ReadMyCert writeup

picoCTF ReadMyCert writeup

1
Comments
1 min read
An Encryption Algorithm
Cover image for An Encryption Algorithm

An Encryption Algorithm

Comments
2 min read
Petoron Quantum Standard (PQS)
Cover image for Petoron Quantum Standard (PQS)

Petoron Quantum Standard (PQS)

Comments
1 min read
Petoron Local Destroyer (PLD)
Cover image for Petoron Local Destroyer (PLD)

Petoron Local Destroyer (PLD)

Comments
1 min read
TraplessPKE — A New Direction for Post-Quantum Cryptography

TraplessPKE — A New Direction for Post-Quantum Cryptography

Comments
2 min read
🔐 Building Quantum-Resistant ZKP: A Developer's Journey into Post-Quantum Cryptography

🔐 Building Quantum-Resistant ZKP: A Developer's Journey into Post-Quantum Cryptography

Comments
5 min read
CantorCipher: A Personal Encryption Project Inspired by Cantor’s Diagonal Argument
Cover image for CantorCipher: A Personal Encryption Project Inspired by Cantor’s Diagonal Argument

CantorCipher: A Personal Encryption Project Inspired by Cantor’s Diagonal Argument

1
Comments
2 min read
🚀 Bitcoin, Quantum Computing & The Next Cyber War — What Devs Should Know
Cover image for 🚀 Bitcoin, Quantum Computing & The Next Cyber War — What Devs Should Know

🚀 Bitcoin, Quantum Computing & The Next Cyber War — What Devs Should Know

1
Comments
3 min read
Symmetric vs Asymmetric Encryption — Lessons from the Field

Symmetric vs Asymmetric Encryption — Lessons from the Field

Comments
2 min read
Cryptographic Implementation Flaws: Modern Encryption Analysis

Cryptographic Implementation Flaws: Modern Encryption Analysis

1
Comments
3 min read
How to Build a Secure Node.js Application with Cryptography Best Practices
Cover image for How to Build a Secure Node.js Application with Cryptography Best Practices

How to Build a Secure Node.js Application with Cryptography Best Practices

Comments
3 min read
Implement AES-256 Encryption and Decryption in C#: A Beginner-Friendly Guide
Cover image for Implement AES-256 Encryption and Decryption in C#: A Beginner-Friendly Guide

Implement AES-256 Encryption and Decryption in C#: A Beginner-Friendly Guide

2
Comments
3 min read
loading...