Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔗 Hash Algorithms
Collision Resistance, Performance, Hash Tables, Cryptographic
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81780
posts in
650.1
ms
Adaptive
Uncertainty-Aware
Tree Search for
Robust
Reasoning
arxiv.org
·
17h
🪜
Recursive Descent
SPPAM
: Signature Pattern Prediction and Access-Map
Prefetcher
arxiv.org
·
4d
⚡
Cache-Aware Algorithms
Enigma
: Decentralized Computation Platform with
Guaranteed
Privacy
dev.to
·
2d
·
Discuss:
DEV
🔗
Hash Functions
From Messy
Wearables
to Insights: Building a Personal Health Data Warehouse with
DuckDB
& Evidence
dev.to
·
1d
·
Discuss:
DEV
🎮
Language Ergonomics
Robust
Majorana
Qubit Encoding in Disordered Two‑Dimensional Topological
Superconductors
Using Adaptive Surface Codes — ### Abstract This study present...
freederia.com
·
4d
🏰
Capability Machines
*Author(s): [Redacted]* *
Affiliation
(s): [Redacted]* *Date: [Redacted]* — ### Abstract We introduce a fully
commercializable
framework that leverages h...
freederia.com
·
3d
🏛️
Elm Architecture
Quantum encryption could work across
city-sized
distances
scimex.org
·
4d
🔗
Hash Functions
Wirth
's
Revenge
jmoiron.net
·
5d
·
Discuss:
Lobsters
,
Hacker News
,
Hacker News
🌳
Tree Shaking
From Monolithic
SoCs
To
Chiplets
: A New Hardware Security Paradigm
semiengineering.com
·
4d
🏰
Capability Machines
PCI
DSS
4.0.1 compliance with
HashiCorp
Vault and Vault Radar
hashicorp.com
·
6d
🛡️
Security Type Systems
GKcodebase/API
_Architecture: API designs in
jaca
github.com
·
3d
·
Discuss:
DEV
🔧
API Design
Updates and Plans V: From
Boise
to Tel Aviv, Ceasefire, My 70th Birthday, Nostalgia, Problems, Outrageous
Conjectures
, Quantum, and AI
gilkalai.wordpress.com
·
6d
🎯
Bit Vectors
What’s the
entropy
of a random
integer
?
quomodocumque.wordpress.com
·
5d
·
Discuss:
Hacker News
🔗
Hash Functions
qzxcvbn/Csa
: THE SOVEREIGN ACCESS CONSTANT (
CsaC
_{sa} Csa) A Universal Open Standard for Passwordless, Zero-Knowledge Internet & Device Authentication
github.com
·
4d
·
Discuss:
Hacker News
🛡️
Security Type Systems
Tutorial - Monero +
P2Pool
+
xmrig
(Linux)
deusop.org
·
5d
·
Discuss:
r/selfhosted
🏗️
Hash Tables
Millets
: A practical memory-safety and thread-safety
experiment
eagledot.xyz
·
6d
·
Discuss:
Lobsters
,
Hacker News
🧠
Memory Models
AIStor
Tables: Native Iceberg V3 for
On-Premises
Object Storage
blog.min.io
·
6d
🔄
Deduplication
A Quick Look at
QUIC
potaroo.net
·
6d
·
Discuss:
Hacker News
📡
Protocol Stacks
CUDA
Guide:
Workflow
for Performance Tuning
digitalocean.com
·
4d
🧠
Memory Hierarchy
Tipping
the Cyber Balance: How AI Benchmarks Could Make Software
Safer
rand.org
·
6d
🏰
Capability Machines
Loading...
Loading more...
« Page 13
•
Page 15 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help