Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
encryption, cryptographic protocols, primitives, cipher
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
171630
posts in
21.8
ms
Understanding Cryptography – From
Established
Symmetric and Asymmetric
Ciphers
to Post-Quantum Algorithms
cryptography-textbook.com
·
2h
·
Discuss:
Hacker News
🛡️
Hardware Security
From
Cryptography
to Key Management:
Securing
Keys in Real-World Systems
medium.com
·
1d
🛡️
Hardware Security
Secret Value Manager in Go
dev.to
·
3h
·
Discuss:
DEV
🛡️
Hardware Security
One Key Good, L Keys Better: List
Decoding
Meets Quantum Privacy
Amplification
arxiv.org
·
10h
🛡️
Hardware Security
secworks/tau256
: A vibe coded block cipher
github.com
·
1d
·
Discuss:
Hacker News
🛡️
Hardware Security
Garb
:
Cipher
uncrate.com
·
17h
📦
Cap'n Proto
The Cryptography Concept Journey —
SPN
(Substitution
Permutation
Networks)
medium.com
·
2d
⚡
Concurrency
Show HN: The future of end-to-end
encrypted
protocols
(2026)
sea.im
·
1d
·
Discuss:
DEV
📡
Protocol Design
From
Torsors
to
Topoi
: An Introduction with a View Toward $\Sigma$-Protocols in Cryptography
arxiv.org
·
2d
📦
Cap'n Proto
xero/leviathan-crypto: Zero-dependency WebAssembly cryptography library for TypeScript: Serpent-256, XChaCha20-Poly1305, SHA-2/3, HMAC,
HKDF
, and Fortuna
CSPRNG
, with a strictly typed API built on vector-verified primitives.
github.com
·
1d
·
Discuss:
Lobsters
,
Hacker News
📦
Cap'n Proto
Beijing wants its own
quantum-resistant
encryption standards rather than adopt
NIST
’s
csoonline.com
·
21h
🛡️
Hardware Security
Quantum
Computers
Will Tap Out Before Breaking
Encryption
, Theory Claims
gizmodo.com
·
17h
·
Discuss:
Hacker News
⚡
Concurrency
Bitcoin Security Is a House of
Cards
youtube.com
·
1d
🛡️
Hardware Security
Turing
Award Goes to
Inventors
of Quantum Cryptography
nytimes.com
·
2d
⚡
Concurrency
A blockchain based
authentication
protocol for secure autonomous vehicles communication in
acoustic
networks
sciencedirect.com
·
2d
🛡️
Hardware Security
Exclusive: How
Automat-it
Helped
Hush
Security Save $45,000 in Annual Cloud Costs
hackernoon.com
·
1d
📦
Sandboxing
A Copy-Paste Bug That Broke
PSpice
®
AES-256
Encryption
jtsylve.blog
·
1d
·
Discuss:
Hacker News
🛡️
Hardware Security
The
Collapse
of
Predictive
Security in the Age of Machine-Speed Attacks
securityweek.com
·
1d
🛡️
Hardware Security
Building a Confidential Sealed-Bid
NFT
Auction on Oasis
Sapphire
faucet.testnet.oasis.dev
·
4h
·
Discuss:
DEV
📦
Cap'n Proto
Exploring Signature-Free Post-Quantum
RLPx
Handshake
ethresear.ch
·
3d
⭕
Ring Buffers
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help