Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Public Key, Digital Signatures, Hash Functions
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187261
posts in
25.8
ms
Privacy-first mind
mapping
app. Part 3:
Encryption
Model
☯️
I Ching
mindmapvault.com
·
6d
·
DEV
Quantum
Computers
Are Coming to Break
Cryptography
Faster Than Anyone Expected
🤖
Cyberpunk
singularityhub.com
·
3d
Optically
reconfigurable physical
unclonable
functions based on 2D MoS 2 ring-oscillator arrays for attack-resistant hardware authentication
⚡
Circuit Bending
nature.com
·
3d
DslsDZC/HIC
: HIC: A hierarchical isolation kernel reference architecture. Unifying security, performance, and
modularity
in a single design, enabling deployment from embedded to cloud with full lifecycle evolution.
📚
Self-Documenting Code
github.com
·
2d
·
Hacker News
The Accidental
Ancestor
— How a Computer for
Verifying
Numbers Shaped Modern Hashing
☯️
I Ching
0xkrt26.github.io
·
3d
·
Hacker News
Solving
Hidden Number Problems Without
Lattices
λ
Functional Programming
leetarxiv.substack.com
·
3d
·
Substack
,
r/programming
Solana
keypair
as Identity explain by and for a beginner
♟️
Game Theory
release.anza.xyz
·
4d
·
DEV
Data Protection on AWS: Building an End-to-End Encryption Strategy for S3,
RDS
, and
Lambda
λ
Functional Programming
medium.com
·
3d
Prime-Field
PINI
: Machine-Checked Composition
Theorems
for Post-Quantum NTT Masking
λ
Functional Programming
arxiv.org
·
2d
Quantum-Resilient
Cryptography
in the
openSUSE
Ecosystem
⚡
Circuit Bending
news.opensuse.org
·
3d
openSUSE
Lands Post-Quantum Hybrid Cryptography in Leap and
Tumbleweed
⚡
Circuit Bending
9to5linux.com
·
3d
Best practices for
hashing
variable-length
data structures
λ
Functional Programming
dynatrace.com
·
6d
Mosaic
: Practical Malicious Security for
Garbled
Circuits on Bitcoin
⚡
Circuit Bending
eprint.iacr.org
·
6d
The Shadow Chain (Part II): PowerShell, SSL/TLS, and the Art of
Bypassing
Corporate
Firewalls
📚
Self-Documenting Code
medium.com
·
6d
Can
Cross-Layer
Design Bridge Security and Efficiency? A Robust
Authentication
Framework for Healthcare Information Exchange Systems
♟️
Game Theory
arxiv.org
·
1d
krb5
_
allow
_weak_crypto (3) Linux Manual Page
λ
Functional Programming
systutorials.com
·
6d
The Post-Quantum Security
Timeline
for Java:
JEP
496,
JEP
527, and What Teams Should Do Now
⚡
Circuit Bending
javacodegeeks.com
·
3d
Cryptography
challenges @
KalmarCTF
2026
λ
Functional Programming
blog.zksecurity.xyz
·
3d
·
Hacker News
Simon's Algorithm for the
Even-Mansour
Cipher
on Quantum Hardware
λ
Functional Programming
arxiv.org
·
2d
Verifying
Provenance of Digital Media: Why the
C2PA
Specifications Fall Short
🌱
Digital Gardens
arxiv.org
·
2d
« Page 1
·
Page 3 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help