Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Public Key, Digital Signatures, Hash Functions
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187323
posts in
19.1
ms
Topology-Driven Symbolic Verification of Post-Quantum Migration Paths Using
Tamarin
Prover
⚡
Circuit Bending
eprint.iacr.org
·
4d
Preventing
Distinguishability
between Multiplication and
Squaring
Operations
λ
Functional Programming
arxiv.org
·
1d
Sum-Check
as an
Algebraic
Tensor Reduction: Part 1
λ
Functional Programming
blog.zksecurity.xyz
·
3d
·
Hacker News
Alterion-Software/alterion-encrypt
: A full end-to-end encryption pipeline for Actix-web —
X25519
ECDH key exchange, AES-256-GCM session encryption, Argon2id password hashing, and a MessagePack + Deflate request/response pipeline, all behind a single middleware.
⚡
Circuit Bending
github.com
·
4d
·
r/rust
Formal
Verification, Integration and Physical Evaluation of Prime-Field
Masking
on Silicon
⚡
Circuit Bending
eprint.iacr.org
·
6d
From
Rerandtopia
to
Interceptopia
, the Anamorphic Encryption Saga Rises
⚡
Circuit Bending
eprint.iacr.org
·
5d
Non-Adaptive Programmable
PRFs
and Applications to Stacked
Garbling
λ
Functional Programming
eprint.iacr.org
·
6d
Improving Correlation Power Analysis on Masked
CRYSTALS-Kyber
with Lattice Attack
♟️
Game Theory
eprint.iacr.org
·
4d
Training Machine Learning Models on
Encrypted
Data: A Privacy-Preserving Framework using
Homomorphic
Encryption
🤖
Machine Learning
arxiv.org
·
3d
Efficient Quantum Fully
Homomorphic
Encryption
λ
Functional Programming
arxiv.org
·
3d
Dynamic-Key Post-Quantum
Encrypted
Control Against System
Identification
Attacks
♟️
Game Theory
arxiv.org
·
3d
PASS: A
Provenanced
Access
Subaccount
System for Blockchain Wallets
♟️
Game Theory
arxiv.org
·
4d
Module
Lattice
Security (Part II):
Module
Lattice
Reduction via Optimal Sign Selection
🎹
Modular Synthesis
arxiv.org
·
3d
Detecting Avalanche Effect in Adversarial Settings:
Spotting
the Encryption
Loops
in Ransomware
⚡
Circuit Bending
arxiv.org
·
3d
DeepSignature
: Digitally Signed, Content-Encoding
Watermarks
for Robust and Transparent Image Authentication
🤖
Machine Learning
arxiv.org
·
3d
Who Audits the Auditor?
Tamper-Proof
Fraud Detection with
Blockchain-Anchored
Explainable ML
🤖
Machine Learning
arxiv.org
·
4d
« Page 2
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help