OpenSSH Post-Quantum Cryptography

NIST Finalizes 'Lightweight Cryptography' Standard to Protect Small Devices

Mastering Bitcoin – Asymmetric Cryptography, Keys & Wallets

Reticulum 1.0.0 The cryptography-based networking stack

Sharing a personal new cryptography paradigm experiment: Dynamic Abstraction Cryptography + Kraken-GS implementation in C

Is post quantum cryptography for iot devices a good topic for reasearch for a beginner computer science student?

Neurocipher: Python project combining cryptography and Hopfield networks

Encrypting files with passkeys and age

Encrypting Files with Passkeys and Age

The FIPS 140-3 Go Cryptographic Module

Age verification doesn't need to be a privacy footgun

How to prove false statements: Practical attacks on Fiat-Shamir

Announcing FOKS, the Federated Open Key Service

Computer Scientists Figure Out How to Prove Lies

Frequently Asked Questions about FHE

Nadim Kobeissi's Applied Cryptography Course

A Wide Reduction Trick (2022)

Running a Certificate Transparency log

Applied Cryptography: comprehensive, novel course materials released under Creative Commons

CoverDrop: Blowing the Whistle Through A News App

RFC 9799: ACME Extensions for ".onion"

Quantum Scientists Have Built a New Math of Cryptography

Crypto 101 – Introductory course on cryptography (2017)

The State of Post-Quantum Cryptography (PQC) on the Web

Visual Cryptography in Rust

New blockchain Petoron Core (ADC). Proprietary architecture and cryptography. No API. No token. Just code and a proprietary P2P network.

Why Can't We Break Cryptography?

A deep-dive explainer on Ink and Switch's BeeKEM protocol

A deep-dive explainer on Ink and Switch's BeeKEM protocol

Spoofing OpenPGP.js signature verification

More →