Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔑 Cryptography
Encryption, TLS, Zero-knowledge, Keys
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
17501
posts in
26.5
ms
From
RSA
to
ECC
: The Impact of Quantum Computing on Modern Cryptography
🔐
Post-Quantum Crypto
dev.to
·
6d
·
DEV
·
…
Building an
Authentication
System With Express
JWT
: A Step-by-Step Guide
🔒
Security
jumpcloud.com
·
1d
·
DEV
·
…
‘It’s a real shock’: quantum-computing
breakthroughs
pose
imminent
risks to cybersecurity
🔐
Post-Quantum Crypto
nature.com
·
1h
·
…
Your Security is My Security
🔒
Network Security
substackcdn.com
·
2d
·
Substack
·
…
Cryptographic
Identity Systems for
Auditing
Autonomous AI Agents
🎭
Token Impersonation
rfc-editor.org
·
4d
·
DEV
·
…
Google finds quantum
computers
could break bitcoin’s encryption
sooner
than expected
🔐
Post-Quantum Crypto
siliconangle.com
·
1d
·
…
I built a zero-knowledge
encrypted
secrets
manager as a solo developer
🔑
DPAPI
cryptvault.app
·
4d
·
DEV
·
…
Quantum Computing Threat to
Encryption
Is
Closer
Than Expected, Warns Google
🔐
Post-Quantum Crypto
infosecurity-magazine.com
·
6d
·
…
Storage solutions with
Midnight
-
handling
off-chain data with privacy
📦
Parquet
dev.to
·
5h
·
DEV
·
…
🔐
AES-256
Finally Makes Sense (And It’s Way
Simpler
Than You Think)
🔐
Post-Quantum Crypto
dev.to
·
22h
·
DEV
·
…
Show HN:
ZKAuth
– Zero-Knowledge identity on Android using Rust +
Plonky2
(39ms proofs)
🦀
Rust
dev.to
·
8h
·
DEV
·
…
🔐 Practical Guide to
ZKP
: Learn Real Usecase of
ZKP
with
Plonky2
🔐
Post-Quantum Crypto
dev.to
·
2d
·
DEV
·
…
End-to-end TLS for public-domain
tunnels
, without
trusting
the relay
🔗
NTLM Relay
dev.to
·
2d
·
DEV
·
…
Rebuilding
TLS
, Part 1 — Why Encryption Alone Is Not Enough
🔒
Security
dev.to
·
3d
·
DEV
·
…
Understanding
ECDSA
Signatures
with the Web Crypto API
🔑
DPAPI
dev.to
·
5d
·
DEV
·
…
How to Build Access Control Without
Passwords
,
Keys
, or Secrets
🚧
Execution Guardrails
dev.to
·
4d
·
DEV
·
…
Serving RSA and
ECDSA
from One ASP.NET Core
Kestrel
Endpoint
🎫
ADCS Attacks
dev.to
·
3d
·
DEV
·
…
The Masked Truth: When Mathematical
Rigor
Becomes Marketing in Modern
Protocols
🌪️
Chaos Engineering
dev.to
·
4d
·
DEV
·
…
I Built a Production-Ready
Biometric
Auth
Microservice
. Here Are 5 Problems Nobody Warns You About.
🔒
Security
dev.to
·
4d
·
DEV
·
…
The
ZK
Circuit Kill Chain: 7 Zero-Knowledge Proof Vulnerabilities That Have Cost DeFi Over $
200M
— And How to Audit for Each One
💥
Binary Exploitation
dev.to
·
5d
·
DEV
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help