Forem

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why Content Provenance Needs Deletion Detection: Introducing CPP v1.0
Cover image for Why Content Provenance Needs Deletion Detection: Introducing CPP v1.0

Why Content Provenance Needs Deletion Detection: Introducing CPP v1.0

Comments
7 min read
Building Tamper-Evident Audit Trails for Trading Systems: A Deep Dive into VCP v1.1
Cover image for Building Tamper-Evident Audit Trails for Trading Systems: A Deep Dive into VCP v1.1

Building Tamper-Evident Audit Trails for Trading Systems: A Deep Dive into VCP v1.1

1
Comments
12 min read
RSA Performance Anatomy: Why is 'Verification' Blazing Fast and 'Signing' Extremely Slow?
Cover image for RSA Performance Anatomy: Why is 'Verification' Blazing Fast and 'Signing' Extremely Slow?

RSA Performance Anatomy: Why is 'Verification' Blazing Fast and 'Signing' Extremely Slow?

1
Comments
8 min read
Building Cryptographic Audit Trails for TradingView Strategies with VCP
Cover image for Building Cryptographic Audit Trails for TradingView Strategies with VCP

Building Cryptographic Audit Trails for TradingView Strategies with VCP

1
Comments
5 min read
YAKMESH™ v1.7.0 - Post-Quantum P2P Mesh Network

YAKMESH™ v1.7.0 - Post-Quantum P2P Mesh Network

Comments
1 min read
Engineering True Randomness: NIST SP 800-90A Standards for High-Load Distributed Systems

Engineering True Randomness: NIST SP 800-90A Standards for High-Load Distributed Systems

Comments
2 min read
Building AI's Flight Recorder: Cryptographic Audit Trails for Algorithmic Trading Under the EU AI Act
Cover image for Building AI's Flight Recorder: Cryptographic Audit Trails for Algorithmic Trading Under the EU AI Act

Building AI's Flight Recorder: Cryptographic Audit Trails for Algorithmic Trading Under the EU AI Act

Comments
18 min read
Proving What AI Didn't Generate: A Cryptographic Solution to the Grok Crisis
Cover image for Proving What AI Didn't Generate: A Cryptographic Solution to the Grok Crisis

Proving What AI Didn't Generate: A Cryptographic Solution to the Grok Crisis

Comments
8 min read
Why Your Secret Sharing Tool Needs Post-Quantum Cryptography Today

Why Your Secret Sharing Tool Needs Post-Quantum Cryptography Today

Comments
2 min read
Securing Your Environment Variables: A Proof-of-Concept Approach
Cover image for Securing Your Environment Variables: A Proof-of-Concept Approach

Securing Your Environment Variables: A Proof-of-Concept Approach

5
Comments
4 min read
Quantum Doomsday Delayed (Again): Why the Latest Panic Over Post-Quantum Cryptography Feels Familiar
Cover image for Quantum Doomsday Delayed (Again): Why the Latest Panic Over Post-Quantum Cryptography Feels Familiar

Quantum Doomsday Delayed (Again): Why the Latest Panic Over Post-Quantum Cryptography Feels Familiar

1
Comments
4 min read
Metaclass Polymorphic Crypto: Enhanced Proof of Concept
Cover image for Metaclass Polymorphic Crypto: Enhanced Proof of Concept

Metaclass Polymorphic Crypto: Enhanced Proof of Concept

5
Comments
5 min read
Multiplication in Galois fields with the xtimes function

Multiplication in Galois fields with the xtimes function

Comments
8 min read
Cryptographic Time Travel: Securely Locking Data Until the Future with tlock

Cryptographic Time Travel: Securely Locking Data Until the Future with tlock

Comments
3 min read
암호화 기초 - 대칭키, HMAC, 그리고 메시지 인증

암호화 기초 - 대칭키, HMAC, 그리고 메시지 인증

Comments
2 min read
Building Tamper-Evident Audit Trails for Algorithmic Trading: A Developer's Guide
Cover image for Building Tamper-Evident Audit Trails for Algorithmic Trading: A Developer's Guide

Building Tamper-Evident Audit Trails for Algorithmic Trading: A Developer's Guide

Comments
8 min read
Building Cryptographically Enforced Time-Locked Vaults on Cloudflare's Edge
Cover image for Building Cryptographically Enforced Time-Locked Vaults on Cloudflare's Edge

Building Cryptographically Enforced Time-Locked Vaults on Cloudflare's Edge

Comments
7 min read
(Part 5) Sealing Secrets: How to Survive a Reboot (And Why It's Dangerous) 💾
Cover image for (Part 5) Sealing Secrets: How to Survive a Reboot (And Why It's Dangerous) 💾

(Part 5) Sealing Secrets: How to Survive a Reboot (And Why It's Dangerous) 💾

1
Comments 1
3 min read
Protecting Sensitive Data Using Envelope Encryption
Cover image for Protecting Sensitive Data Using Envelope Encryption

Protecting Sensitive Data Using Envelope Encryption

Comments
6 min read
Building Cryptographic Audit Trails for SEC Rule 17a-4: A Technical Deep Dive
Cover image for Building Cryptographic Audit Trails for SEC Rule 17a-4: A Technical Deep Dive

Building Cryptographic Audit Trails for SEC Rule 17a-4: A Technical Deep Dive

Comments
9 min read
The EU AI Act Doesn't Mandate Cryptographic Logs—But You'll Want Them Anyway
Cover image for The EU AI Act Doesn't Mandate Cryptographic Logs—But You'll Want Them Anyway

The EU AI Act Doesn't Mandate Cryptographic Logs—But You'll Want Them Anyway

Comments
8 min read
Announcing securebit_core: A Platform-Agnostic Cryptographic Kernel for Secure P2P Communication

Announcing securebit_core: A Platform-Agnostic Cryptographic Kernel for Secure P2P Communication

Comments
3 min read
RSA Algorithm

RSA Algorithm

Comments
5 min read
Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)
Cover image for Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)

Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)

Comments
7 min read
Digital Signatures: Mechanics and Go Benchmarks (RSA vs ECDSA vs Ed25519)
Cover image for Digital Signatures: Mechanics and Go Benchmarks (RSA vs ECDSA vs Ed25519)

Digital Signatures: Mechanics and Go Benchmarks (RSA vs ECDSA vs Ed25519)

Comments
7 min read
loading...