Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Ciphers, Hash Functions, PKI
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
184118
posts in
115.0
ms
Additive
Cryptography for
TLS
🔒
Network Security
snkth.com
·
5d
Can
Cross-Layer
Design Bridge Security and Efficiency? A Robust
Authentication
Framework for Healthcare Information Exchange Systems
📊
Information Theory
arxiv.org
·
11h
Post Quantum
Cryptography
Group
⛓️
Blockchain
lclhost.org
·
1d
·
Hacker News
Post-quantum encryption for Cloudflare
IPsec
is
generally
available
🔒
Network Security
blog.cloudflare.com
·
1h
Cryptography
challenges @
KalmarCTF
2026
🐛
Fuzzing
blog.zksecurity.xyz
·
2d
·
Hacker News
As someone who works on the Linux kernel's cryptography code, the
regularly
occu
...
🔐
Hardware Security
news.ycombinator.com
·
15h
·
Hacker News
New
Techniques
for Communication-Efficient Secure Comparison
Protocols
🔐
Zero-Knowledge Proofs
eprint.iacr.org
·
6d
TOTP
, SMS, Hardware Keys, and
Passkeys
: An Honest 2FA Comparison
🔐
Hardware Security
havenmessenger.com
·
15h
·
DEV
Quantum-Resilient
Cryptography
in the
openSUSE
Ecosystem
🔐
Zero-Knowledge Proofs
news.opensuse.org
·
2d
What are the most common
authentication
methods
?
🔒
Network Security
techtarget.com
·
22h
Password
Management
🔒
Network Security
nthp.me
·
2d
GnuPG
– post-quantum crypto landing in
mainline
🔐
Hardware Security
lists.gnupg.org
·
4d
·
Hacker News
Security is a
composite
system
🔒
Network Security
aleksei.dev
·
18h
Upgrade any Ethereum wallet to post-quantum security in one transaction using
ZK
proofs
with a hidden public key
🔐
Hardware Security
ethresear.ch
·
1d
Managing SSH access at scale with
HashiCorp
Vault
🔐
Hardware Security
hashicorp.com
·
22h
Protecting
your secrets from
tomorrow
’s quantum risks
🔐
Hardware Security
aws.amazon.com
·
5d
openSUSE
Lands Post-Quantum Hybrid Cryptography in Leap and
Tumbleweed
🔐
Zero-Knowledge Proofs
9to5linux.com
·
2d
Full Disclosure: [
IWCC
2026] CfP: 15th International Workshop on Cyber Crime -
Linköping
, Sweden, Aug 24-27, 2026
🔒
Cybersecurity
seclists.org
·
21h
Quantum
Computers
Are Coming to Break
Cryptography
Faster Than Anyone Expected
🔐
Hardware Security
singularityhub.com
·
2d
Algorithms
in
Java
Series
📊
Algorithms
baeldung.com
·
21h
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help