Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Cryptography
encryption, ciphers, cryptanalysis, PKI, hash functions
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
185
posts in
13.8
ms
Myths about /dev/urandom
🔌
Hardware Security
2uo.de
·
6d
·
Hacker News
See You at Y10K: From Millennium Bugs to Quantum Midnight
⏱️
Network Time Protocol
space.gekko.de
·
2d
·
Hacker News
Ethereum plans to move from BLS
signatures
to post quantum secure
signatures
🔌
Hardware Security
hashcloak.com
·
12h
·
Hacker News
Mini Shai Hulud: Compromised @antv npm packages enable
CI/CD
credential theft
👻
Spectre
microsoft.com
·
10h
BIDO: A Biometric Identity Online
Authentication
Framework
🔒
Digital Privacy
arxiv.org
·
2d
Encryption
Is Strong. The Attacker Bypasses It Anyway.
🔐
Cybersecurity
siliconopera.com
·
6d
QIZ Security teams up with Google Cloud to
help
enterprises brace for the quantum
cryptography
threat
🔒
Digital Privacy
thenextweb.com
·
15h
RFC 9807: The OPAQUE Augmented
Password-Authenticated
Key Exchange (aPAKE) Protocol
🔐
Encryption
datatracker.ietf.org
·
2d
·
DEV
RHEL 10.2 Released with Post-Quantum SSH and Kernel Livepatching
🐧
Debian
linuxiac.com
·
6h
PGP
encryption
and key management tool for Android
📱
GrapheneOS
lemmy.ml
·
6d
Quantum computers may break today’s
encryption
much sooner than scientists expected
🔌
Hardware Security
zmescience.com
·
1d
Explore LLM word representations using similarity analysis (part 2)
⚙️
Compression Benchmarking
thepalindrome.org
·
17h
WD securing disk drives with post-quantum
cryptography
🔌
Hardware Security
blocksandfiles.com
·
2d
When
Encryption
Meets Quantum
🔌
Hardware Security
eetimes.com
·
6d
Q Day Preparedness: White Paper & Recommendations
🔐
Cybersecurity
icitech.org
·
13h
Post-Quantum
Cryptography
(PQC) Analysis
🔐
Cybersecurity
ntop.org
·
2d
Christophe Pettus: Two Decades, Two RCEs: What pgcrypto Has Been Doing Since 2005
🔐
Encryption
thebuild.com
·
5d
·
Hacker News
JWT Tokens Decoded: What's Actually Inside Your
Auth
Token
🔐
Encryption
snappytools.app
·
18h
·
DEV
Quantum computers’ first killer apps are closer than you think
🕹️
Hardware Emulation
scientificamerican.com
·
1d
LatticeShield – Quantum-safe reverse proxy in pure Rust, no FFI
🔐
Encryption
github.com
·
14h
·
Hacker News
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help