Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
encryption, ciphers, cryptanalysis, PKI, hash functions
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186594
posts in
23.4
ms
The
Tyranny
of Security
🔐
Cybersecurity
javvadmalik.com
·
1d
Kubernetes
Security from the
Ground
Up
🔐
Encryption
medium.com
·
2d
Password
Management
🔐
Encryption
nthp.me
·
3d
·
Hacker News
Soundness
Failures in
LaBRADOR
Implementations from NTT -Friendly Rings
🔌
Hardware Security
blog.zksecurity.xyz
·
17h
·
Hacker News
,
r/crypto
What are the most common
authentication
methods
?
🔐
Cybersecurity
techtarget.com
·
1d
The Shadow Chain (Part II): PowerShell, SSL/TLS, and the Art of
Bypassing
Corporate
Firewalls
🌐
DNS over QUIC
medium.com
·
6d
openSUSE
Lands Post-Quantum Hybrid Cryptography in Leap and
Tumbleweed
🔐
Cybersecurity
9to5linux.com
·
2d
CKKS
—
Polynomials
, the Canonical Embedding, and Encoding
🌐
DNS over QUIC
jeremykun.com
·
1d
·
Hacker News
Revocation
🔐
Encryption
potaroo.net
·
5d
·
Hacker News
Distributing
the
Keys
for Private Access to the Web
🌐
DNS over QUIC
cdt.org
·
1d
·
Lobsters
Why C Remains the Gold
Standard
for
Cryptographic
Software
🦀
Rust Systems
wolfssl.com
·
6d
·
Lobsters
,
Hacker News
,
r/C_Programming
The Post-Quantum Security
Timeline
for Java:
JEP
496,
JEP
527, and What Teams Should Do Now
🔌
Hardware Security
javacodegeeks.com
·
2d
Allocation
Update - Q1 2026
🐘
Mastodon
blog.ethereum.org
·
2d
Mosaic
: Practical Malicious Security for
Garbled
Circuits on Bitcoin
🔌
Hardware Security
eprint.iacr.org
·
6d
Optically
reconfigurable physical
unclonable
functions based on 2D MoS 2 ring-oscillator arrays for attack-resistant hardware authentication
🔌
Hardware Security
nature.com
·
2d
Beyond Code Reasoning: A
Specification-Anchored
Audit Framework for Expert-Augmented Security Verification
🔐
Cybersecurity
arxiv.org
·
21h
Week 17
🔐
Cybersecurity
thisweekin4n6.com
·
4d
Dormant
Digital
Assets
🔌
Hardware Security
blog.dshr.org
·
2d
·
Blogger
Secure SSH access at scale with
HashiCorp
Vault and
Boundary
🛡️
Network Security
hashicorp.com
·
1d
Data Protection on AWS: Building an End-to-End Encryption Strategy for S3,
RDS
, and
Lambda
🌐
DNS over QUIC
medium.com
·
3d
« Page 1
·
Page 3 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help