Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔗 Hash Algorithms
Collision Resistance, Performance, Hash Tables, Cryptographic
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81911
posts in
769.6
ms
I built a
cryptographic
memory layer for humans in Python tags: python,
opensource
, security, blockchain
dev.to
·
1d
·
Discuss:
DEV
🏷️
Memory Tagging
What should I program?
jamesmcm.github.io
·
18h
🏗️
Minimal Compilers
Label-Consistent
Backdoor
Attacks
paperium.net
·
10h
·
Discuss:
DEV
🛡️
Security Type Systems
Mojo
Jojo CTF OSINT Serial Killer chain
writeups
medium.com
·
1h
🔤
Regex Engines
Hitting
1,000
tokens
per second on a single RTX 5090
blog.alpindale.net
·
3h
·
Discuss:
Hacker News
🎯
Ring Buffers
How many
known
passwords
do you have?
discuss.privacyguides.net
·
1d
🔗
Hash Functions
Human-like Search for Modern
Applications
anvitra.ai
·
23h
·
Discuss:
Hacker News
🔍
Search Algorithms
Building "zero-gap"
secrets
for a
UGC
platform
news.ycombinator.com
·
2d
·
Discuss:
Hacker News
🔗
Hash Functions
An API for
deterministic
procedural
generation (same seed = same output)
goldenseed-api.vercel.app
·
7h
·
Discuss:
r/proceduralgeneration
🎲
Test Generators
Performance Tip of the Week #83:
Reducing
memory
indirections
abseil.io
·
1d
💾
Cache Algorithms
B+-Tree
Structure
: How Order Is
Maintained
at Scale
dev.to
·
7h
·
Discuss:
DEV
🌳
B+ Trees
Time-Complexity Characterization of
NIST
Lightweight
Cryptography
Finalists
arxiv.org
·
2d
🔗
Hash Functions
gharasathi
(
घर
ासाठी) — A Privacy-First Household AI Running on a $200 Mini PC
amazon.com.au
·
22h
·
Discuss:
DEV
💬
Smalltalk VMs
Thumbwheel
switches
: Turning numbers into control
edn.com
·
9h
💾
Register Pressure
Registration
Data Access
Protocol
apnic.net
·
22h
📡
Network Serialization
30+ Data
Engineer
Interview Questions and
Answers
analyticsvidhya.com
·
9h
🗄️
Database Engines
*Quantum‑Resistant Cryptographic Hash Functions Based on the
Colored
Jones Polynomial of
Knots
*
freederia.com
·
3d
🔗
Hash Functions
Early History of a Perfect Join
Algorithm
remy.wang
·
1d
📈
Query Optimization
Home
eventhorizonarchitecture.org
·
6h
🛡️
Error Boundaries
Privacy-preserving data analysis using a
memristor
chip with
colocated
authentication and processing
science.org
·
2d
🏷️
Memory Tagging
Loading...
Loading more...
« Page 1
•
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help