Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Ciphers, Hash Functions, PKI
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
184376
posts in
26.2
ms
Additive
Cryptography for
TLS
🔒
Network Security
snkth.com
·
5d
Can
Cross-Layer
Design Bridge Security and Efficiency? A Robust
Authentication
Framework for Healthcare Information Exchange Systems
📊
Information Theory
arxiv.org
·
14h
Post Quantum
Cryptography
Group
⛓️
Blockchain
lclhost.org
·
1d
·
Hacker News
Post-quantum encryption for Cloudflare
IPsec
is
generally
available
🔒
Network Security
blog.cloudflare.com
·
5h
Cryptography
challenges @
KalmarCTF
2026
🐛
Fuzzing
blog.zksecurity.xyz
·
2d
·
Hacker News
As someone who works on the Linux kernel's cryptography code, the
regularly
occu
...
🔐
Hardware Security
news.ycombinator.com
·
18h
·
Hacker News
New
Techniques
for Communication-Efficient Secure Comparison
Protocols
🔐
Zero-Knowledge Proofs
eprint.iacr.org
·
6d
TOTP
, SMS, Hardware Keys, and
Passkeys
: An Honest 2FA Comparison
🔐
Hardware Security
havenmessenger.com
·
18h
·
DEV
Quantum-Resilient
Cryptography
in the
openSUSE
Ecosystem
🔐
Zero-Knowledge Proofs
news.opensuse.org
·
2d
airlock
: AI Trust as a Variable - A
Cryptographic
Protocol for Runtime Identity Verification
🔐
Zero-Knowledge Proofs
zenodo.org
·
2h
·
Hacker News
Security is a
composite
system
🔒
Network Security
aleksei.dev
·
21h
Upgrade any Ethereum wallet to post-quantum security in one transaction using
ZK
proofs
with a hidden public key
🔐
Hardware Security
ethresear.ch
·
1d
GnuPG
– post-quantum crypto landing in
mainline
🔐
Hardware Security
lists.gnupg.org
·
4d
·
Hacker News
openSUSE
Lands Post-Quantum Hybrid Cryptography in Leap and
Tumbleweed
🔐
Zero-Knowledge Proofs
9to5linux.com
·
2d
Protecting
your secrets from
tomorrow
’s quantum risks
🔐
Hardware Security
aws.amazon.com
·
5d
The Post-Quantum Security
Timeline
for Java:
JEP
496,
JEP
527, and What Teams Should Do Now
🔐
Hardware Security
javacodegeeks.com
·
2d
Secure
signatures
without a private key
🔐
Zero-Knowledge Proofs
katexochen.aro.bz
·
1d
·
Lobsters
,
Hacker News
Alterion-Software/alterion-encrypt
: A full end-to-end encryption pipeline for Actix-web —
X25519
ECDH key exchange, AES-256-GCM session encryption, Argon2id password hashing, and a MessagePack + Deflate request/response pipeline, all behind a single middleware.
🔒
Network Security
github.com
·
4d
·
r/rust
Distributing
the
Keys
for Private Access to the Web
🔒
Network Security
cdt.org
·
1d
·
Lobsters
hcrypto
_
evp
(3) Linux Manual Page
🔐
Hardware Security
systutorials.com
·
6d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help