Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Applied Cryptography
Encryption, Security, Hash Functions, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
122012
posts in
1.12
s
Digital
Signal
Processing
With Audio Data
m.youtube.com
·
1d
🔢
mathematics
Decoding the secrets of the
Antikythera
mechanism
kill-the-newsletter.com
·
2d
🔢
mathematics
A
note
about personal security
werd.io
·
1d
·
Discuss:
Hacker News
🔓
open source
Securing
IoT devices: why
passwords
are not enough
iotinsider.com
·
4d
🔢
mathematics
Filesystem
Hierarchy
Standard 3.0
refspecs.linuxfoundation.org
·
9h
🔓
open source
GUID
/
UUID
V7 - Unix Time-Ordered Identifier (Recommended)
guidsgenerator.com
·
2d
·
Discuss:
Hacker News
🔢
mathematics
Usage of Mixed Integer Linear Programming in
Cryptanalysis
of Block
Ciphers
eprint.iacr.org
·
1d
🔢
mathematics
HTTP/2
From
Scratch
: Part 1
kmcd.dev
·
1d
🔓
open source
Securing
the Digital
Nerve
System: A Practical Guide to Implementing Zero Trust API Security
hackernoon.com
·
2d
🔓
open source
Show HN:
BlockHost
OS – Autonomous VM
provisioning
through smart contracts
github.com
·
12h
·
Discuss:
Hacker News
🔓
open source
microgpt
karpathy.github.io
·
16h
🔢
mathematics
An automated geometric space
curve
approach for designing dynamically
corrected
gates
nature.com
·
2d
🔓
open source
Associative
Methods
dev.to
·
4h
·
Discuss:
DEV
🔢
mathematics
CodeSOD
:
Cover
Up
thedailywtf.com
·
1d
🔓
open source
Security, Privacy and System-Level
Resillience
of 6G End-to-End System:
Hexa-X-II
Perspective
arxiv.org
·
18h
🔢
mathematics
How the GNU C Compiler became the
Clippy
of
cryptography
theregister.com
·
3d
·
Discuss:
Hacker News
,
r/programming
🔓
open source
How to make an AI ready business, the easy way
phillyharper.medium.com
·
1d
·
Discuss:
Hacker News
🔓
open source
Hope Is Not a Security Strategy: Why
Secure-by-Default
Beats
Hardening
programming.dev
·
1d
🔓
open source
Kidnapped: An
OSINT
CTF by
HACKTORIA
medium.com
·
21h
🔓
open source
ECHO: Efficient
Covertly-Secure
Three-party
Computation
with Applications to Private Machine Learning
eprint.iacr.org
·
2d
🔓
open source
Loading...
Loading more...
« Page 4
•
Page 6 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help