DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
VCP v1.1: Cryptographic Audit Trails for AI Trading Systems (EU AI Act Ready)

VCP v1.1: Cryptographic Audit Trails for AI Trading Systems (EU AI Act Ready)

1
Comments
10 min read
YAKMESH™ v2.5.0 - Post-Quantum P2P Mesh Network

YAKMESH™ v2.5.0 - Post-Quantum P2P Mesh Network

Comments
1 min read
Building a Camera That Cannot Lie: How VeriCapture's CPP Implementation Advances Verifiable Provenance

Building a Camera That Cannot Lie: How VeriCapture's CPP Implementation Advances Verifiable Provenance

Comments
7 min read
YAKMESH™ v2.0.0 - Post-Quantum P2P Mesh Network

YAKMESH™ v2.0.0 - Post-Quantum P2P Mesh Network

Comments
1 min read
Why Content Provenance Needs Deletion Detection: Introducing CPP v1.0

Why Content Provenance Needs Deletion Detection: Introducing CPP v1.0

Comments
7 min read
Building Tamper-Evident Audit Trails for Trading Systems: A Deep Dive into VCP v1.1

Building Tamper-Evident Audit Trails for Trading Systems: A Deep Dive into VCP v1.1

1
Comments
12 min read
RSA Performance Anatomy: Why is 'Verification' Blazing Fast and 'Signing' Extremely Slow?

RSA Performance Anatomy: Why is 'Verification' Blazing Fast and 'Signing' Extremely Slow?

1
Comments
8 min read
Building Cryptographic Audit Trails for TradingView Strategies with VCP

Building Cryptographic Audit Trails for TradingView Strategies with VCP

1
Comments
5 min read
YAKMESH™ v1.7.0 - Post-Quantum P2P Mesh Network

YAKMESH™ v1.7.0 - Post-Quantum P2P Mesh Network

Comments
1 min read
YAKMESH™ v2.2.0 - Post-Quantum P2P Mesh Network

YAKMESH™ v2.2.0 - Post-Quantum P2P Mesh Network

Comments
1 min read
Engineering True Randomness: NIST SP 800-90A Standards for High-Load Distributed Systems

Engineering True Randomness: NIST SP 800-90A Standards for High-Load Distributed Systems

Comments
2 min read
Building AI's Flight Recorder: Cryptographic Audit Trails for Algorithmic Trading Under the EU AI Act

Building AI's Flight Recorder: Cryptographic Audit Trails for Algorithmic Trading Under the EU AI Act

Comments
18 min read
Proving What AI Didn't Generate: A Cryptographic Solution to the Grok Crisis

Proving What AI Didn't Generate: A Cryptographic Solution to the Grok Crisis

Comments
8 min read
Why Your Secret Sharing Tool Needs Post-Quantum Cryptography Today

Why Your Secret Sharing Tool Needs Post-Quantum Cryptography Today

Comments
2 min read
Securing Your Environment Variables: A Proof-of-Concept Approach

Securing Your Environment Variables: A Proof-of-Concept Approach

5
Comments
4 min read
Quantum Doomsday Delayed (Again): Why the Latest Panic Over Post-Quantum Cryptography Feels Familiar

Quantum Doomsday Delayed (Again): Why the Latest Panic Over Post-Quantum Cryptography Feels Familiar

1
Comments
4 min read
Metaclass Polymorphic Crypto: Enhanced Proof of Concept

Metaclass Polymorphic Crypto: Enhanced Proof of Concept

5
Comments
5 min read
Multiplication in Galois fields with the xtimes function

Multiplication in Galois fields with the xtimes function

Comments
8 min read
Cryptographic Time Travel: Securely Locking Data Until the Future with tlock

Cryptographic Time Travel: Securely Locking Data Until the Future with tlock

Comments
3 min read
암호화 기초 - 대칭키, HMAC, 그리고 메시지 인증

암호화 기초 - 대칭키, HMAC, 그리고 메시지 인증

Comments
2 min read
Building Tamper-Evident Audit Trails for Algorithmic Trading: A Developer's Guide

Building Tamper-Evident Audit Trails for Algorithmic Trading: A Developer's Guide

Comments
8 min read
Building Cryptographically Enforced Time-Locked Vaults on Cloudflare's Edge

Building Cryptographically Enforced Time-Locked Vaults on Cloudflare's Edge

Comments
7 min read
(Part 5) Sealing Secrets: How to Survive a Reboot (And Why It's Dangerous) 💾

(Part 5) Sealing Secrets: How to Survive a Reboot (And Why It's Dangerous) 💾

1
Comments 1
3 min read
Protecting Sensitive Data Using Envelope Encryption

Protecting Sensitive Data Using Envelope Encryption

Comments
6 min read
Building Cryptographic Audit Trails for SEC Rule 17a-4: A Technical Deep Dive

Building Cryptographic Audit Trails for SEC Rule 17a-4: A Technical Deep Dive

Comments
9 min read
loading...