Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Ciphers, Hash Functions, PKI
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
184079
posts in
27.8
ms
hcrypto
_
evp
(3) Linux Manual Page
🔐
Hardware Security
systutorials.com
·
6d
Distributing
the
Keys
for Private Access to the Web
🔒
Network Security
cdt.org
·
1d
·
Lobsters
Soundness
Failures in
LaBRADOR
Implementations from NTT -Friendly Rings
🐛
Fuzzing
blog.zksecurity.xyz
·
10h
·
Hacker News
,
r/crypto
CKKS
—
Polynomials
, the Canonical Embedding, and Encoding
🔐
Zero-Knowledge Proofs
jeremykun.com
·
1d
·
Hacker News
Solving
Hidden Number Problems Without
Lattices
🔐
Zero-Knowledge Proofs
leetarxiv.substack.com
·
3d
·
Substack
,
r/programming
Allocation
Update - Q1 2026
⛓️
Blockchain
blog.ethereum.org
·
1d
Preventing
Distinguishability
between Multiplication and
Squaring
Operations
⚠️
Error Handling
arxiv.org
·
13h
Optically
reconfigurable physical
unclonable
functions based on 2D MoS 2 ring-oscillator arrays for attack-resistant hardware authentication
🔐
Hardware Security
nature.com
·
2d
Revocation
🔒
Network Security
potaroo.net
·
4d
·
Hacker News
The
Tyranny
of Security
🔒
Cybersecurity
javvadmalik.com
·
1d
Data Protection on AWS: Building an End-to-End Encryption Strategy for S3,
RDS
, and
Lambda
☁️
Cloud Computing
medium.com
·
3d
Modernizing
Backup Encryption:
Transitioning
from Self-Managed Engines to Google Cloud PostgreSQL
🗄️
Database Internals
medium.com
·
1d
What are the most common
authentication
methods
?
🔒
Network Security
techtarget.com
·
1d
The Shadow Chain (Part II): PowerShell, SSL/TLS, and the Art of
Bypassing
Corporate
Firewalls
🔒
Network Security
medium.com
·
6d
Dormant
Digital
Assets
⛓️
Blockchain
blog.dshr.org
·
2d
·
Blogger
Privacy-first mind
mapping
app. Part 3:
Encryption
Model
🔐
Hardware Security
mindmapvault.com
·
6d
·
DEV
The Accidental
Ancestor
— How a Computer for
Verifying
Numbers Shaped Modern Hashing
🔐
Zero-Knowledge Proofs
0xkrt26.github.io
·
2d
·
Hacker News
Kubernetes
Security from the
Ground
Up
🔒
Network Security
medium.com
·
2d
Practical Post-Quantum Secure
Publicly
Verifiable
Secret Sharing and Applications
🔐
Zero-Knowledge Proofs
eprint.iacr.org
·
5d
DslsDZC/HIC
: HIC: A hierarchical isolation kernel reference architecture. Unifying security, performance, and
modularity
in a single design, enabling deployment from embedded to cloud with full lifecycle evolution.
📁
Dotfiles
github.com
·
1d
·
Hacker News
« Page 1
·
Page 3 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help