Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Ciphers, Hash Functions, PKI
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
149948
posts in
16.5
ms
Simplest
hash
functions
🔐
Zero-Knowledge Proofs
purplesyringa.moe
·
4d
·
Hacker News
Towards Post-Quantum
Cryptography
in
TLS
(2019)
🔐
Hardware Security
blog.cloudflare.com
·
2d
·
Hacker News
Hashing
vs
Encryption
: What’s the Difference and Which One Should You Use?
🔒
Network Security
medium.com
·
11h
Show HN:
Keeper
–
embedded
secret store for Go (help me break it)
🔐
Hardware Security
github.com
·
3h
·
Hacker News
Yikes
, Encryption’s
Y2K
Moment is Coming Years Early
🔐
Hardware Security
eff.org
·
14h
Quantum cryptanalysis of
SPN
ciphers
with known plaintext
🔐
Zero-Knowledge Proofs
nature.com
·
2d
The
Joy
Of
Cryptography
(MIT Press)
🔐
Zero-Knowledge Proofs
i-programmer.info
·
3d
A
Cryptography
Engineer’s Perspective on Quantum Computing
Timelines
🔐
Hardware Security
discuss.privacyguides.net
·
18h
Dots,
Dashes
, and Deception: How I Cracked
BSides
Seattle’s Cryptography CTF
🔐
Hardware Security
medium.com
·
2d
Deterministic Breach of Public-Key Cryptographic Systems (
RSA/ECC
) via Theorem IV
🔐
Zero-Knowledge Proofs
medium.com
·
11h
Evaluating PQC
KEMs
,
Combiners
, and Cascade Encryption via Adaptive IND-CPA Testing Using Deep Learning
🔐
Zero-Knowledge Proofs
arxiv.org
·
1d
Beyond
ChaCha20
and AES: Exploring Rational Quadratic Functions for Cryptographic
Randomness
🔐
Zero-Knowledge Proofs
medium.com
·
4d
VEIL
: Lightweight Zero-Knowledge for Hash-Based
Multilinear
Proof Systems
🔐
Zero-Knowledge Proofs
eprint.iacr.org
·
2d
Hideout
– file encryption and
decryption
🔒
Network Security
linuxlinks.com
·
4d
The
Visible
Key
🔐
Zero-Knowledge Proofs
aperceptualdrifter.substack.com
·
5d
·
Substack
Going in
Circles
: Fourier,
Primes
, and the Quantum Threat to Cryptography
🔒
Cybersecurity
medium.com
·
4d
Circuits to
Ciphers
: How I Decoded My Way Through
BSides
Seattle’s Crypto Village Challenges (Part…
🔐
Zero-Knowledge Proofs
medium.com
·
9h
Anamorphic
Encryption with
CCA
Security: A Standard Model Construction
🔐
Zero-Knowledge Proofs
arxiv.org
·
8h
Dritonsallahu/risaal-crypto
:
Risaal
Crypto — Dart implementation of the Signal Protocol for end-to-end encrypted messaging.
🔒
Network Security
github.com
·
2d
·
Hacker News
How AWS
KMS
and AWS Encryption SDK overcome
symmetric
encryption bounds
🔐
Hardware Security
aws.amazon.com
·
6d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help