About the cryptography category

Purpose
Cryptography gives users the ability to communicate, store and send information even in the presence of bad actors. It is used to protect messages, identities, and economic value. With NIST finalising new post‑quantum standards while classical algorithms still secure billions of devices, this board bridges theory and practice. Discuss findings that help the community understand why certain primitives matter, how they can fail, and what it takes to deploy them safely at scale.

Common themes

  • New or improved PQ algorithms and parameters
  • Practical attacks (classical or quantum) and mitigations
  • Implementation notes: side‑channel safety, performance tuning
  • Standards work and real‑world deployment stories

Posting Guidelines

  1. Search first – avoid duplicate threads and tag your post.
  2. Cite sources – link papers, specs, or code when possible.
  3. Stay respectful – critique ideas, not people.
  4. Use clear titles – make it easy for others to understand the topic at a glance.

Note
If you feel there is a missing tag for this topic, comment here. All other none relevant comments will be removed