Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Applied Cryptography
Encryption, Security, Hash Functions, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
122148
posts in
1.18
s
Message from ACM President
Yannis
Ioannidis
acm.org
·
1d
🔢
mathematics
$\
mathsf
{SoK}$: On
Cryptography
for Multi-Cloud Storage
eprint.iacr.org
·
3d
🔓
open source
A
note
about personal security
werd.io
·
1d
·
Discuss:
Hacker News
🔓
open source
Associative
Methods
dev.to
·
2h
·
Discuss:
DEV
🔢
mathematics
Filesystem
Hierarchy
Standard 3.0
refspecs.linuxfoundation.org
·
7h
🔓
open source
Auto-unlocking a
LUKS-encrypted
root volume with
Clevis
and a TPM (Debian/Ubuntu)
rainygarden.net
·
15h
🔓
open source
PBKDF2
en.wikipedia.org
·
4d
🔓
open source
Exposed
Training Open the Door for Crypto-Mining in
Fortune
500 Cloud Environments
thehackernews.com
·
1d
🔓
open source
remote
locks
and
distributed
locks
tautik.me
·
1d
🍳
cooking
Signing JSON Web
Tokens
: Algorithm
Tradeoffs
, Performance, and Security
ciamweekly.substack.com
·
3d
·
Discuss:
Substack
🔢
mathematics
[
TUHS
] bare m4 (was BTL
summmer
employees)
tuhs.org
·
1d
·
Discuss:
Lobsters
🔓
open source
SAST vs DAST vs (
IAST/RASP
): Quick AppSec Checklist
codereviewlab.com
·
2d
·
Discuss:
DEV
🔓
open source
E2EE
Backend part 1:
Homomorphic
Encryption
peterspath.net
·
3d
·
Discuss:
Hacker News
🔓
open source
SecureGen
- Open-Source
TOTP
Authenticator, Password Manager
hackster.io
·
1d
🔓
open source
Privacy-Utility
Tradeoffs
in Quantum Information Processing
arxiv.org
·
16h
🔢
mathematics
Phishing
Attacks in 2026: How to Spot, Stop & Report
Scams
technadu.com
·
1d
🔢
mathematics
Quantum Money, the
apotheosis
of
cypherpunk
frontstageexit.com
·
1d
🔓
open source
Digital
Signal
Processing
With Audio Data
m.youtube.com
·
1d
🔢
mathematics
Four Seconds to Botnet - Analyzing a Self
Propagating
SSH Worm with
Cryptographically
Signed C2 [Guest Diary], (Wed, Feb 11th)
isc.sans.edu
·
20h
🔓
open source
The Guide to
OpenBao
-
Introduction
blog.stderr.at
·
1d
🔓
open source
Loading...
Loading more...
« Page 3
•
Page 5 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help