Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔑 Cryptography
encryption, TLS, PKI, cryptographic protocols
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
188189
posts in
15.6
ms
Can
Cross-Layer
Design Bridge Security and Efficiency? A Robust
Authentication
Framework for Healthcare Information Exchange Systems
🔏
PKI
arxiv.org
·
3d
Webhook
Security: How to Verify Incoming Requests with
HMAC
Signatures
🔓
Cryptanalysis
snappytools.app
·
1d
·
DEV
crypto_
skcipher
_
encrypt
(9) Linux Manual Page
🤝
ACME Protocol
systutorials.com
·
8h
Open Source Security
Mailing
List
🐧
Linux Kernel
seclists.org
·
12m
Babayagga-bite/epr2-qaas-blockchain
: EPR-2 Quantum-as-a-Service for Blockchain — Post-quantum cryptography API (ML-KEM-768 + ML-DSA-65, NIST FIPS 203/204) to protect wallets and transactions against quantum attacks.
🤝
ACME Protocol
github.com
·
2d
·
Hacker News
Stacked
intelligent surfaces could boost wireless reliability and security for
6G
🔧
Hardware
techxplore.com
·
21h
Post Quantum
Cryptography
Group
🔓
Cryptanalysis
lclhost.org
·
4d
·
Hacker News
Storing
Passwords
Securely
🔓
Cryptanalysis
patrickmn.com
·
2d
3 easy-to-miss
cybersecurity
risks for small
businesses
🔒
Security
malware.news
·
3h
Prove Your Skills. Get AI Engineer, Go, or Python Certificates
Recruiters
Can
Verify
.
💻
Software Dev
gophercert.com
·
20h
·
Hacker News
Showoff
Saturday: I got tired of
pasting
proprietary JSON and keys online, so I built a suite of 77+ dev tools that runs 100% entirely client-side (Vanilla JS).
🤝
ACME Protocol
cipherkit.app
·
1d
·
r/SideProject
Detecting Post-Quantum and Hybrid
TLS
Deployments via Raw
TLS
Record
Inspection
🤝
ACME Protocol
eprint.iacr.org
·
5d
Cyber-Insecurity
in the AI Era
🚨
Threat Detection
technologyreview.com
·
1d
·
Hacker News
CipherLock
🔓
Cryptanalysis
producthunt.com
·
3d
Understanding Identity System
Protections
in Modern IT and
IoT
Environments
🔏
PKI
iotbusinessnews.com
·
2d
Encryption
breaking technology is now 20x cheaper and
CEOs
should be very worried
🔓
Cryptanalysis
techradar.com
·
2d
Password
Management
🔒
Security
nthp.me
·
5d
·
Hacker News
airlock
: AI Trust as a Variable - A
Cryptographic
Protocol for Runtime Identity Verification
🤝
ACME Protocol
zenodo.org
·
2d
·
Hacker News
What are the most common
authentication
methods
?
🔏
PKI
techtarget.com
·
3d
Linux | Security |
Networking
🔌
Networking
lisenet.com
·
1d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help