SoK: Systematizing Hybrid Strategies for the Transition to Post-Quantum Cryptography
eprint.iacr.orgยท4d
๐Ÿ”“open source
Flag this post
Feistel Cipher: The Architectural Marvel Behind Modern Cryptography
dev.toยท18hยท
Discuss: DEV
๐Ÿ”“open source
Flag this post
The Builder's Notes: Your CFO Just Called โ€” Except It's a $2.4M Deepfake and Your AI Approved It
pub.towardsai.netยท1d
๐Ÿ”“open source
Flag this post
Implementing Bitcoin in a dead language - bbrtj
bbrtj.euยท1dยท
Discuss: r/programming
๐Ÿ”“open source
Flag this post
Auth Series: Yet Another Password Authentication Flow.. but hear me out
dev.toยท23hยท
Discuss: DEV
๐Ÿ”“open source
Flag this post
Derek Elkins: Umbral Calculus
hedonisticlearning.comยท1d
๐Ÿ”ขmathematics
Flag this post
Quantum-Resistant Federated Learning: Securing Distributed Model Training Against Post-Quantum Cryptography Threats
dev.toยท1dยท
Discuss: DEV
๐Ÿ”ขmathematics
Flag this post
New Fast Date Algorithms Pt 2 - Overflow Safe
benjoffe.comยท16hยท
Discuss: r/cpp
๐Ÿ”“open source
Flag this post
Getting Started With Queryable Encryption With the MongoDB EF Core Provider
dev.toยท1dยท
Discuss: DEV
๐Ÿ”“open source
Flag this post
FSF EU Notarization Complaint
mjtsai.comยท7h
๐Ÿ”“open source
Flag this post
How good is AI at Hacking AD?
blog.vulnetic.aiยท4hยท
Discuss: Hacker News
๐Ÿ”“open source
Flag this post
Forwarding packets at scale - Building a Cloud Data Plane using eBPF/XDP (denog17)
cdn.media.ccc.deยท10h
๐Ÿ”“open source
Flag this post
These are still the most popular passwords around - and surely, we can do better than this as a species
techradar.comยท1d
๐Ÿ”“open source
Flag this post
LLM side-channel attack could allow snoops to guess what you're talking about
theregister.comยท3h
๐Ÿ”“open source
Flag this post
How Point Cloud to BIM Helps Surveyors Reduce Costs and Save Time
scantobim.onlineยท17hยท
Discuss: DEV
๐Ÿ”ขmathematics
Flag this post
SampCert: Verified Foundations for Differential Privacy (PLDI 2025)
dl.acm.orgยท4dยท
Discuss: Hacker News
๐Ÿ”ขmathematics
Flag this post
Deep Learning for Molecules and Materials
dmol.pubยท18hยท
Discuss: Hacker News
๐Ÿ”ขmathematics
Flag this post
Cyberattackers are getting more evasive: How can defenders keep up?
siliconrepublic.comยท12h
๐Ÿ”“open source
Flag this post