Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Hash Algorithms
Collision Resistance, Performance, Hash Tables, Cryptographic
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
113352
posts in
410.1
ms
Characterizing and Optimizing the Spatial Kernel of Multi Resolution
Hash
Encodings
arxiv.org
ยท
23h
๐๏ธ
Hash Tables
Basic
Legibility
Protocols
Improve Trusted Monitoring
lesswrong.com
ยท
10h
๐ก๏ธ
Security Type Systems
rouzbehsbz/spenta
: Fast data-parallel iterator for Go
github.com
ยท
8h
ยท
Discuss:
r/golang
โญ๏ธ
Skip Lists
ITSAKE
: an
unconditionally
secure authenticated key establishment protocol
eprint.iacr.org
ยท
2d
๐
Hash Functions
๐ Beginner-Friendly Guide 'Longest Balanced
Substring
I' -
Leetcode
Problem 3713 (C++, Python, JavaScript)
dev.to
ยท
1d
ยท
Discuss:
DEV
๐ชข
Rope Algorithms
LateOn-Code
&
ColGrep
: LightOn unveils state-of-the-art code retrieval models and code search tooling
huggingface.co
ยท
11h
ยท
Discuss:
Hacker News
๐ค
Language Tokenizers
TileIR
ianbarber.blog
ยท
1d
ยท
Discuss:
Hacker News
โก
Partial Evaluation
Crypto Research Tools
medium.com
ยท
12h
๐ก๏ธ
Taint Analysis
Data
Overload
in Fitness Tracking Technologies: A
Multidimensional
Framework for Understanding Challenges and Optimizing User Experience
zenodo.org
ยท
15h
ยท
Discuss:
Hacker News
๐ก๏ธ
Error Ergonomics
Implementation of Polynomial
NP-Complete
Algorithms Based on the
NP
Verifier
Simulation Framework
arxiv.org
ยท
23h
๐งฉ
SAT Solvers
VPN anonymity
undermined
by new
AdBleed
fingerprinting technique
discuss.privacyguides.net
ยท
1d
๐
Security Types
Smarter together in
concrete
:one
unified
data language
concretedatamodel.com
ยท
13h
๐ข
Algebraic Datatypes
Show HN: The
Algorithm
's Favorite Child
next.chatbotkit.com
ยท
12h
ยท
Discuss:
Hacker News
๐ฌ
Interactive REPLs
SAST vs DAST vs (
IAST/RASP
): Quick AppSec Checklist
codereviewlab.com
ยท
2d
ยท
Discuss:
DEV
๐ก๏ธ
Parser Security
AI-Assisted Web and Cloud Penetration Testing with Cursor + MCP
HexStrike
and
Burp
Suite MCP.
infosecwriteups.com
ยท
22h
๐ฐ
Capability Machines
Pwning
Supercomputers โ A 20 year old vulnerability in
Munge
blog.lexfo.fr
ยท
6h
ยท
Discuss:
Hacker News
๐ก
Erlang BEAM
๐ The hidden cost of
PostgreSQL
arrays
yellowduck.be
ยท
1d
๐พ
Cache-Oblivious Algorithms
Carding-as-a-Service
: The
Underground
Market of Stolen Cards
rapid7.com
ยท
14h
๐ก๏ธ
Security Type Systems
Don't pass on small block
ciphers
00f.net
ยท
3d
๐
Hash Functions
Past Automation and Future A.I.: How
Weak
Links
Tame
the Growth Explosion [pdf]
web.stanford.edu
ยท
6h
ยท
Discuss:
Hacker News
๐
Lens Libraries
Loading...
Loading more...
« Page 1
โข
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help