Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
encryption, ciphers, cryptanalysis, PKI, hash functions
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187352
posts in
14.0
ms
Additive
Cryptography for
TLS
🔐
Encryption
snkth.com
·
5d
Storing
Passwords
Securely
🔐
Encryption
patrickmn.com
·
2h
Can
Cross-Layer
Design Bridge Security and Efficiency? A Robust
Authentication
Framework for Healthcare Information Exchange Systems
🌐
DNS over QUIC
arxiv.org
·
23h
Post Quantum
Cryptography
Group
🔌
Hardware Security
lclhost.org
·
2d
·
Hacker News
Cryptography
challenges @
KalmarCTF
2026
🌐
DNS over QUIC
blog.zksecurity.xyz
·
2d
·
Hacker News
Asiadav/OpenPBKDF2
: An open-source ASIC implementation of the PBKDF2 algorithm using SHA256 encryption
✅
FLAC Verification
github.com
·
2h
airlock
: AI Trust as a Variable - A
Cryptographic
Protocol for Runtime Identity Verification
🔒
Digital Privacy
zenodo.org
·
11h
·
Hacker News
New
Techniques
for Communication-Efficient Secure Comparison
Protocols
⚡
Concurrency
eprint.iacr.org
·
6d
As someone who works on the Linux kernel's cryptography code, the
regularly
occu
...
🐧
Linux Internals
news.ycombinator.com
·
1d
·
Hacker News
Help Net Security
🛡️
Network Security
sh.itjust.works
·
14h
'PIN and data remain encrypted at rest': This
unhackable
offline device is quietly solving a problem most companies don’t realize is about to cost them
everythi
...
🔒
Digital Privacy
techradar.com
·
8h
Quantum-Resilient
Cryptography
in the
openSUSE
Ecosystem
🌐
DNS over QUIC
news.opensuse.org
·
2d
GnuPG
– post-quantum crypto landing in
mainline
✅
FLAC Verification
lists.gnupg.org
·
4d
·
Hacker News
Post-quantum encryption for Cloudflare
IPsec
is
generally
available
🔗
Tailscale
blog.cloudflare.com
·
13h
·
Hacker News
Security is a
composite
system
🔐
Cybersecurity
aleksei.dev
·
1d
suseconds
_t (3) Linux
Manual
Page
⏱️
Network Time Protocol
systutorials.com
·
9h
Protecting
your secrets from
tomorrow
’s quantum risks
🔐
Encryption
aws.amazon.com
·
6d
Full Disclosure: [
IWCC
2026] CfP: 15th International Workshop on Cyber Crime -
Linköping
, Sweden, Aug 24-27, 2026
🔐
Cybersecurity
seclists.org
·
1d
Kubernetes
Security from the
Ground
Up
🔐
Encryption
medium.com
·
2d
Solving
Hidden Number Problems Without
Lattices
🔌
Hardware Security
leetarxiv.substack.com
·
3d
·
Substack
,
r/programming
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help