Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Cryptography
encryption, ciphers, cryptanalysis, PKI, hash functions
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
200529
posts in
46.3
ms
Encrypt
Secret Messages to be
Unlockable
Under the Right Environmental Conditions
🔐
Encryption
hackster.io
·
2d
Encryption Is Strong. The
Attacker
Bypasses
It Anyway.
🎭
Obfuscation
siliconopera.com
·
11h
The Cost of Quantum Resistance: A Hash-Based Commit-Reveal Alternative for
Minimizing
Blockchain Infrastructure
Overhead
⛓️
Blockchain Security
arxiv.org
·
3d
pocs/fragnesia
at main
🔌
Hardware Security
github.com
·
1d
·
Lobsters
,
Hacker News
,
r/linux
Blockchain
Fortress
: The Future of Cyber Security in the Digital Age
🔐
Security
medium.com
·
3d
A Union
Cipher
🔓
Cipher History
futilitycloset.com
·
3d
Simple, modern, secure file
encryption
and
signing
tool
🔑
Password Managers
kryptor.co.uk
·
5d
·
Hacker News
On
Succinct
Non-Interactive Secure
Computation
with Malicious Security
🌊
Stream Ciphers
eprint.iacr.org
·
6d
Plaintext
E01
: Generalized
Bulletproofs
with Luke Parker
🌊
Stream Ciphers
discuss.privacyguides.net
·
3d
Lockout
Without
Encryption
🔑
Password Managers
ghostlock.io
·
3d
·
Hacker News
HEART: A High-Efficiency Adaptive Real-Time
Telemonitoring
Framework for Secure
Electrocardiogram
Signal Transmission Using Chaotic Encryption
🌊
Stream Ciphers
arxiv.org
·
2d
CySecurity
News - Latest Information Security and Hacking Incidents:
Apricorn
Launches 32TB Encrypted Drive to Strengthen Offline Data Security Against Cyber Threats
🔒
Container Security
cysecurity.news
·
3d
·
Blogger
Show HN: Key
Exchange
Utility
for Key Analysis
🔒
TLS/SSL
github.com
·
6d
·
Hacker News
Extending Blockchain
Untraceability
with Plausible
Deniability
⛓️
Blockchain Security
arxiv.org
·
23h
A Framework of Variable-Length Source Encryption using Mutual Information Security
Criterion
: Universal Coding, Strong
Converse
Theorem
🌊
Stream Ciphers
arxiv.org
·
2d
Generic Construction of
CCA-Secure
PKE
from Key-Insulated and Privacy-Preserving Signatures with Publicly Derived Public Key
🔒
Runtime Security
eprint.iacr.org
·
4d
SoK: Private LLM Inference using
Approximate
Homomorphic
Encryption
💻
Local LLMs
eprint.iacr.org
·
3d
BitVM3
: Efficient Bitcoin Bridges via
Garbled
Circuits
🌊
Stream Ciphers
eprint.iacr.org
·
3d
Toward Space-Based Public Key Systems:
Enabling
Secure Space Communications through
In-Orbit
Trust Services
🛰️
Satellite Security
arxiv.org
·
6d
Cryptographic and Information-theoretic Security Capacities for General
Arbitrarily
Varying
Wiretap
Channels
🌊
Stream Ciphers
arxiv.org
·
3d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help