Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Zero-Knowledge Proofs
Specific
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
150297
posts in
16.0
ms
Context-Binding Gaps in
Stateful
Zero-Knowledge
Proximity
Proofs: Taxonomy, Separation, and Mitigation
📡
Observability
arxiv.org
·
3d
VEIL
: Lightweight Zero-Knowledge for Hash-Based
Multilinear
Proof Systems
🔐
Cryptography
eprint.iacr.org
·
2d
Verifying
private quantum
circuits
🔐
Cryptography
medium.com
·
14h
·
Hacker News
Incremental
Lambda
Calculus
⚠️
Error Handling
inc-lc.github.io
·
4h
·
Hacker News
Post-Quantum
BIP-86
Recovery via
zk-STARK
Proof of
BIP-32
Seed Knowledge
🔐
Cryptography
groups.google.com
·
1d
Deterministic Breach of Public-Key Cryptographic Systems (
RSA/ECC
) via Theorem IV
🔐
Cryptography
medium.com
·
12h
Show HN:
Keeper
–
embedded
secret store for Go (help me break it)
🔐
Cryptography
github.com
·
4h
·
Hacker News
Fun
Little
Solutions
📊
Algorithms
blog.computationalcomplexity.org
·
4d
·
blog.computationalcomplexity.org
Quantum cryptanalysis of
SPN
ciphers
with known plaintext
🔐
Cryptography
nature.com
·
2d
Beyond the GIL: Implementing Zero-Copy
Parsers
for 2026
OSINT
Streams
🔍
OSINT
medium.com
·
20h
Building
DocProof
:
Proving
Documents Exist Without Sharing Them
🔐
Cryptography
docproof.org
·
20h
·
DEV
Empline
(
THM
) Tryhackme WriteUp With Answer
✍️
Prompt Engineering
medium.com
·
5h
Separator-Based
Participation Commitments for Post-Quantum
Attestation
Aggregation
🌐
Distributed Systems
ethresear.ch
·
1d
Proof
Projectors
🔐
Hardware Security
blog.voboda.com
·
5d
Blind SQL Injection with
Conditional
Responses
⚠️
Error Handling
medium.com
·
10h
Towards Post-Quantum
Cryptography
in
TLS
(2019)
🔐
Cryptography
blog.cloudflare.com
·
2d
·
Hacker News
Lectures
in Advanced Data
Structures
(6.851)
📊
Algorithms
courses.csail.mit.edu
·
21h
Beyond
ChaCha20
and AES: Exploring Rational Quadratic Functions for Cryptographic
Randomness
🔐
Cryptography
medium.com
·
4d
I Got
Burned
Out From Building, So I
Broke
Into My Own App Instead
🔒
Cybersecurity
medium.com
·
22h
WeakC4
, or
Distilling
an Emergent Object
📊
Algorithms
2swap.github.io
·
1d
·
Hacker News
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help