Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔗 Hash Algorithms
Collision Resistance, Performance, Hash Tables, Cryptographic
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81170
posts in
494.6
ms
Plato
's Form: Toward
Backdoor
Defense-as-a-Service for LLMs with Prototype Representations
arxiv.org
·
10h
🏰
Capability Machines
Time-Complexity Characterization of
NIST
Lightweight
Cryptography
Finalists
arxiv.org
·
3d
🔗
Hash Functions
When Clever Hardware Hacks Bite Back: A Password
Keeper
Device
Autopsy
hackaday.com
·
1d
🏷️
Memory Tagging
B+-Tree
Structure
: How Order Is
Maintained
at Scale
dev.to
·
20h
·
Discuss:
DEV
🌳
B+ Trees
Registration
Data Access
Protocol
apnic.net
·
1d
📡
Network Serialization
THIS IS HOW REAL
PASSWORD
MANAGERS
ACTUALLY WORK
dev.to
·
3h
·
Discuss:
DEV
🛡️
Security Type Systems
I
struggled
with system design until I learned these 114
concepts
newsletter.systemdesign.one
·
2d
🗄️
Database Engines
Human-like Search for Modern
Applications
anvitra.ai
·
1d
·
Discuss:
Hacker News
🔍
Search Algorithms
philipl/pifs
:
πfs
- the data-free filesystem!
github.com
·
1d
·
Discuss:
Hacker News
🔄
Deduplication
Evolving
our real-time
timeseries
storage again: Built in Rust for performance at scale
datadoghq.com
·
21h
📮
Message Queues
Tips
lonestation.itch.io
·
1d
🔍
Fuzzy Matching
Deep dive into
Hierarchical
Navigable
Small Worlds
amandeepsp.github.io
·
1d
·
Discuss:
Hacker News
,
r/Zig
,
r/programming
🤐
Zipper Structures
Jan Kristof
Nidzwetzki
: eBPF Tracing of PostgreSQL
Spinlocks
jnidzwetzki.github.io
·
1d
🎯
Ring Buffers
Constrained parallel
tempering
in
traveling-salesman
problems with circular neighborhoods
link.aps.org
·
2d
⏭️
Skip Lists
MicroBlaze
MCS Seven-Segment Counter on
Basys
3 FPGA
hackster.io
·
1d
🤖
Embedded Go
Heterogeneous
Processing: A Strategy for
Augmenting
Moore's Law (2006)
linuxjournal.com
·
1d
·
Discuss:
Hacker News
🔀
SIMD Programming
CySecurity News - Latest Information Security and Hacking Incidents: Unsecured Database Exposes 149 Million
Logins
Linked to
Infostealer
Malware Operations
cysecurity.news
·
2d
·
Discuss:
Blogger
🔐
Security Types
An
attempt
at a
First-Proof
AI challenge
abhvio.us
·
1d
·
Discuss:
Hacker News
λ
Lambda Calculus
Nonlinear random walks on
hypergraphs
characterized
by higher-order interactions
sciencedirect.com
·
1d
🧮
Combinator Calculus
Part 1 the Persistent
Vault
Issue: Your Encryption Strategy Has a
Shelf
Life
news.ycombinator.com
·
1d
·
Discuss:
Hacker News
🛡️
Security Type Systems
Loading...
Loading more...
« Page 3
•
Page 5 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help