Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Applied Cryptography
Encryption, Security, Hash Functions, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
112951
posts in
783.1
ms
Which is your
preferred
password
manager software? 2nd Edition. New and improved
elevenforum.com
·
1d
🔢
mathematics
Don't pass on small block
ciphers
00f.net
·
4d
🔓
open source
The future of software engineering - The future of software development
retreat
thoughtworks.com
·
23h
·
Discuss:
Lobsters
,
Hacker News
🔓
open source
Building a Custom OSINT Tool for Digital
Footprinting
(by
lazyekansh
)
dev.to
·
40m
·
Discuss:
DEV
🔓
open source
SCA-MQDSA
: Side-Channel Analysis of Multivariate Digital Signature Implementations
eprint.iacr.org
·
3d
🔢
mathematics
The necessary and sufficient condition for perfect
teleportation
and
superdense
coding and all the suitable states for
teleportation
and
superdense
coding
arxiv.org
·
1d
🔢
mathematics
Goutham
Reddy
: Row-level and Column-level Security
postgr.es
·
1d
🔓
open source
Cosmologically
Unique
IDs
jasonfantl.com
·
2d
·
Discuss:
Hacker News
🔢
mathematics
Various levels of authentication for
gated
medical content on
pharmaceutical
websites
thomasrigby.com
·
2d
🔓
open source
Keep Your
Secrets
Safe
dev.to
·
1d
·
Discuss:
DEV
🔓
open source
Hiding
information inside images
nullonerror.org
·
1d
·
Discuss:
Hacker News
🔓
open source
sshca
: tool to manage SSH CA
certificates
doc.liw.fi
·
2d
🔓
open source
Smart
Anti-Kickback
System for Electric
Drills
hackster.io
·
2d
🍳
cooking
Quantum Computing and AI
Boom
: Inside the
High-Stakes
Tech Race
bloomberg.com
·
1d
🔢
mathematics
Code Is
Poetry
ta.fo
·
17h
🔢
mathematics
Your Walk
Betrays
You: How AI Gait Recognition Ends
Anonymity
smarterarticles.co.uk
·
1d
🔓
open source
Securing modern workloads with
HashiCorp
Vault and
WIF
hashicorp.com
·
1d
🔓
open source
The
implementation
of digital
forensic
science in a Swiss police force
sciencedirect.com
·
1d
🔓
open source
Secure
Scattered
Memory: Rethinking Secure
Enclave
Memory with Secret Sharing
arxiv.org
·
1d
🔓
open source
Unzipping
the Threat: How to Block Malware Hidden in Password-Protected
ZIP
Files
blog.checkpoint.com
·
1d
🔓
open source
Loading...
Loading more...
« Page 1
•
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help