Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
📜 Proof Languages
Curry-Howard, Proposition Types, Constructive Logic, Verification
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
123597
posts in
2.87
s
On Crypto
Cycles
thediff.co
·
1d
🎯
Ring Buffers
Ethereum Signature Schemes Explained: ECDSA, BLS,
XMSS
, and Post-Quantum
leanSig
with Rust Code Examples
blog.lambdaclass.com
·
2d
📡
Binary Protocols
3/4
spell
swap
extra notes
cowboy-starshine.itch.io
·
1d
🏷️
Symbol Mangling
Well-Typed.Com
:
hs-bindgen
0.1-alpha release
well-typed.com
·
2d
·
Discuss:
Lobsters
,
Hacker News
📋
Tablegen
Go
Concurrency
with Database
Transactions
postgresql.org
·
2d
·
Discuss:
DEV
🛡️
Error Handling
Stop
Writing
Prompts
. Start Building Agents (with Code)
audiopod.ai
·
2d
·
Discuss:
DEV
📚
Factor
Six
Weeks
of
Molting
artlu.bearblog.dev
·
1d
🏗️
Cranelift
The
Friendly
Functional
Programming Language
ivylang.net
·
6d
⚡
functional programming
wordchipper
- my next-gen LLM tokenizer; looking for
LTR
release help
docs.rs
·
2d
·
Discuss:
r/rust
🔤
Language Tokenizers
Insecurity
of Quantum Secure
Computations
paperium.net
·
2d
·
Discuss:
DEV
🔗
Hash Functions
Mathematical Resolution of P vs NP through
Informational
Noise
Subtraction
and Linear O(n) Mapping
zenodo.org
·
4d
·
Discuss:
Hacker News
🧩
SAT Solvers
eVer: Universal and Automated Verification of Side-Channel Security for
Additive
, Inner Product, Polynomial and General Code-Based
Masking
eprint.iacr.org
·
2d
📏
Linear Memory
**Abstract:** This research introduces a novel framework for formally
verifying
software specifications using quantum logic-enhanced hierarchical
decompositi
...
freederia.com
·
5d
🧮
Theorem Provers
The Role of Signal To
Noise
in Loss
Convergence
pub.towardsai.net
·
1d
🪜
Recursive Descent
The Verification Theater: When Formal Methods Create False
Assurance
in
Cryptographic
Libraries
eprint.iacr.org
·
6d
🛡️
Security Type Systems
Solved
: I’ve always
wanted
to make something like this. Does anyone know how to
dev.to
·
12h
·
Discuss:
DEV
💻
Terminal Control
DCP-o-matic
• (Feature) Request for
Verifier
dcpomatic.com
·
16h
✅
Configuration Validation
supabase-community/copycat
: Generate deterministic fake values: The same input will always generate the same fake-output.
github.com
·
7h
🛡️
Parser Security
Show HN: Cyber+ – A
DSL
for scripting cybersecurity
workflows
news.ycombinator.com
·
12h
·
Discuss:
Hacker News
🎨
DSL Design
Differential
Logic
• 2
inquiryintoinquiry.com
·
5d
🧩
Prolog
Loading...
Loading more...
« Page 9
•
Page 11 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help