Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Applied Cryptography
Encryption, Security, Hash Functions, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81128
posts in
532.8
ms
Mastering
Authentication
in MCP: An AI Engineer’s Comprehensive Guide
pub.towardsai.net
·
1h
🔓
open source
Main
Content ||
Math
∩ Programming
jeremykun.com
·
8h
🔢
mathematics
Securing
IoT devices: why
passwords
are not enough
iotinsider.com
·
22h
🔢
mathematics
High‑Performance Cryptographic Hash Function Based on
Mersenne
Prime Field Arithmetic and Efficient Modular Reduction **Abstract**
Mersenne
primes
\(p=2^q-1\...
freederia.com
·
3d
🔢
mathematics
The End of
IPFS
: Centralized Pinning Single Points of Failure, Cryptographic Hash Backdoors, DDoS Exploitation, and Gossip-Based Distributed Node
Eradication
zenodo.org
·
8h
·
Discuss:
Hacker News
🔓
open source
Adaptive
Hashing
: Faster Hash Functions with Fewer
Collisions
arxiv.org
·
3d
·
Discuss:
Hacker News
🔢
mathematics
Part 1 the Persistent
Vault
Issue: Your Encryption Strategy Has a
Shelf
Life
news.ycombinator.com
·
1d
·
Discuss:
Hacker News
🔓
open source
We have
broken
SHA-1
in practice
shattered.io
·
1d
·
Discuss:
Hacker News
🔓
open source
I built a
cryptographic
memory layer for humans in Python tags: python,
opensource
, security, blockchain
dev.to
·
1d
·
Discuss:
DEV
🔓
open source
Telling the Story of
Chameleon
Hash
Functions: A 27-Year Review
eprint.iacr.org
·
4d
🔢
mathematics
Home
eventhorizonarchitecture.org
·
10h
🔓
open source
Deobfuscation
and Analysis of
Ring-1.io
back.engineering
·
12h
·
Discuss:
Hacker News
🔓
open source
Uncovering
Hidden
Informations
whiteravendev.itch.io
·
12h
🔓
open source
Differential
Logic
• 4
inquiryintoinquiry.com
·
18h
🔢
mathematics
Jeffrey
Funk
.
Unicorns
, Hype, and Bubbles: A Guide to Spotting, Avoiding, and Exploiting Investment Bubbles in Tech
journals.sagepub.com
·
1d
🔓
open source
Securing
Hardware
For The Quantum Era
semiengineering.com
·
3d
🔓
open source
Data protection in the age of artificial intelligence: why
transparency
, control, and
humanity
are now crucial
igorslab.de
·
1d
🔢
mathematics
555-Based Square-Wave and
Triangle-Wave
Function Generator Build for
Beginners
hackaday.com
·
1d
🔓
open source
Autocrypt
v2 - Post-Quantum and Reliable
Deletion
for Internet Messaging
autocrypt2.org
·
2d
🔓
open source
How To Go
Slow
artima.com
·
1d
🔢
mathematics
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help