Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Hash Algorithms
Collision Resistance, Performance, Hash Tables, Cryptographic
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
113553
posts in
509.7
ms
Characterizing and Optimizing the Spatial Kernel of Multi Resolution
Hash
Encodings
arxiv.org
ยท
21h
๐๏ธ
Hash Tables
rouzbehsbz/spenta
: Fast data-parallel iterator for Go
github.com
ยท
6h
ยท
Discuss:
r/golang
โญ๏ธ
Skip Lists
ITSAKE
: an
unconditionally
secure authenticated key establishment protocol
eprint.iacr.org
ยท
2d
๐
Hash Functions
LateOn-Code
&
ColGrep
: LightOn unveils state-of-the-art code retrieval models and code search tooling
huggingface.co
ยท
10h
ยท
Discuss:
Hacker News
๐ค
Language Tokenizers
TileIR
ianbarber.blog
ยท
22h
ยท
Discuss:
Hacker News
โก
Partial Evaluation
Data
Overload
in Fitness Tracking Technologies: A
Multidimensional
Framework for Understanding Challenges and Optimizing User Experience
zenodo.org
ยท
13h
ยท
Discuss:
Hacker News
๐ก๏ธ
Error Ergonomics
Crypto Research Tools
medium.com
ยท
11h
๐ก๏ธ
Taint Analysis
Implementation of Polynomial
NP-Complete
Algorithms Based on the
NP
Verifier
Simulation Framework
arxiv.org
ยท
21h
๐งฉ
SAT Solvers
Smarter together in
concrete
:one
unified
data language
concretedatamodel.com
ยท
11h
๐ข
Algebraic Datatypes
VPN anonymity
undermined
by new
AdBleed
fingerprinting technique
discuss.privacyguides.net
ยท
1d
๐
Security Types
Show HN: The
Algorithm
's Favorite Child
next.chatbotkit.com
ยท
11h
ยท
Discuss:
Hacker News
๐ฌ
Interactive REPLs
SAST vs DAST vs (
IAST/RASP
): Quick AppSec Checklist
codereviewlab.com
ยท
2d
ยท
Discuss:
DEV
๐ก๏ธ
Parser Security
AI-Assisted Web and Cloud Penetration Testing with Cursor + MCP
HexStrike
and
Burp
Suite MCP.
infosecwriteups.com
ยท
21h
๐ฐ
Capability Machines
Pwning
Supercomputers โ A 20 year old vulnerability in
Munge
blog.lexfo.fr
ยท
4h
ยท
Discuss:
Hacker News
๐ก
Erlang BEAM
The
BEHILOS
Benchmark: Performance Analysis of
Low-Footprint
CLI Search Tools
dev.to
ยท
13h
ยท
Discuss:
DEV
๐
Language Benchmarks
https://
blog.matthewcodes.dev/wp-content/uploads/2026/02/computer-comms.png
How computer systems talk โ part one:
sockets
and websockets
blog.matthewcodes.dev
ยท
4h
ยท
Discuss:
r/programming
๐
Minimal HTTP
Don't pass on small block
ciphers
00f.net
ยท
3d
๐
Hash Functions
๐ The hidden cost of
PostgreSQL
arrays
yellowduck.be
ยท
1d
๐พ
Cache-Oblivious Algorithms
Carding-as-a-Service
: The
Underground
Market of Stolen Cards
rapid7.com
ยท
12h
๐ก๏ธ
Security Type Systems
Past Automation and Future A.I.: How
Weak
Links
Tame
the Growth Explosion [pdf]
web.stanford.edu
ยท
4h
ยท
Discuss:
Hacker News
๐
Lens Libraries
Loading...
Loading more...
« Page 1
โข
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help