Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Public Key, Digital Signatures, Hash Functions
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187323
posts in
10.8
ms
Additive
Cryptography for
TLS
📚
Self-Documenting Code
snkth.com
·
6d
Post Quantum
Cryptography
Group
⚡
Circuit Bending
lclhost.org
·
2d
·
Hacker News
Storing
Passwords
Securely
⚙️
Systems Programming
patrickmn.com
·
7h
SBN
Explorer: An Empirical Study of Cryptographic
Boolean
Networks
λ
Functional Programming
arxiv.org
·
3h
Secure
signatures
without a private key
⚡
Circuit Bending
katexochen.aro.bz
·
2d
·
Lobsters
,
Hacker News
Asiadav/OpenPBKDF2
: An open-source ASIC implementation of the PBKDF2 algorithm using SHA256 encryption
⚡
Circuit Bending
github.com
·
7h
How do digital
signatures
work?
📚
Self-Documenting Code
techtarget.com
·
6d
CipherLock
☯️
I Ching
producthunt.com
·
18h
CKKS
—
Polynomials
, the Canonical Embedding, and Encoding
λ
Functional Programming
jeremykun.com
·
1d
·
Hacker News
Soundness
Failures in
LaBRADOR
Implementations from NTT -Friendly Rings
λ
Functional Programming
blog.zksecurity.xyz
·
23h
·
Hacker News
,
r/crypto
Upgrade any Ethereum wallet to post-quantum security in one transaction using
ZK
proofs
with a hidden public key
⚡
Circuit Bending
ethresear.ch
·
1d
GnuPG
– post-quantum crypto landing in
mainline
📚
Self-Documenting Code
lists.gnupg.org
·
5d
·
Hacker News
'PIN and data remain encrypted at rest': This
unhackable
offline device is quietly solving a problem most companies don’t realize is about to cost them
everythi
...
⚡
Circuit Bending
techradar.com
·
12h
Dormant
Digital
Assets
⚡
Circuit Bending
blog.dshr.org
·
2d
·
Blogger
Revocation
☯️
I Ching
potaroo.net
·
5d
·
Hacker News
As someone who works on the Linux kernel's cryptography code, the
regularly
occu
...
📚
Self-Documenting Code
news.ycombinator.com
·
1d
·
Hacker News
Practical Post-Quantum Secure
Publicly
Verifiable
Secret Sharing and Applications
♟️
Game Theory
eprint.iacr.org
·
6d
Protecting
your secrets from
tomorrow
’s quantum risks
⚡
Circuit Bending
aws.amazon.com
·
6d
Show HN: Quantum Temporal
Cryptography
– spec for
interplanetary
trust chains
♟️
Game Theory
zenodo.org
·
5d
·
Hacker News
Quantum Anonymous Secret Sharing with
Permutation
Invariant
Codes
♟️
Game Theory
arxiv.org
·
3h
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help