Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π Cryptography
encryption, cryptographic protocols, primitives, cipher
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
172405
posts in
24.0
ms
Understanding Cryptography β From
Established
Symmetric and Asymmetric
Ciphers
to Post-Quantum Algorithms
cryptography-textbook.com
Β·
14h
Β·
Discuss:
Hacker News
π
Distributed Systems
From
Cryptography
to Key Management:
Securing
Keys in Real-World Systems
medium.com
Β·
1d
π
Distributed Systems
Secret Value Manager in Go
dev.to
Β·
15h
Β·
Discuss:
DEV
πΉ
Golang
trekhleb/javascript-algorithms
: π Algorithms and data structures implemented in JavaScript with explanations and links to further
readings
github.com
Β·
4h
β‘
Concurrency
One Key Good, L Keys Better: List
Decoding
Meets Quantum Privacy
Amplification
arxiv.org
Β·
23h
π
Distributed Systems
Watch
Cryptography
Happen: A Terminal Animation for
Threshold
Signatures
eric.mann.blog
Β·
13h
Β·
Discuss:
Hacker News
βοΈ
Prompt Engineering
Security
Assurance
and Security
Operations
infosec.mozilla.org
Β·
8h
π»
Software Engineering
Quantum cryptography
pioneers
win Turing Award for
unhackable
encryption breakthrough
techspot.com
Β·
11h
β‘
Concurrency
Garb
:
Cipher
uncrate.com
Β·
1d
πΉ
Golang
I built a zero-knowledge vault with
WebAuthn
passkeys
, no passwords
emvproject-production.up.railway.app
Β·
33m
Β·
Discuss:
Hacker News
π
API Design
jtesta/ssh-audit
: SSH server & client security
auditing
(banner, key exchange, encryption, mac, compression, compatibility, security, etc)
github.com
Β·
5h
β
Java
The Cryptography Concept Journey β
SPN
(Substitution
Permutation
Networks)
medium.com
Β·
2d
β‘
Concurrency
The Bob Blueprint: Mastering
IaC
with Terraform and Ansible, Vault Security, and
OTel
Observability in One Click
dev.to
Β·
10h
Β·
Discuss:
DEV
πΉ
Golang
Show HN: The future of end-to-end
encrypted
protocols
(2026)
sea.im
Β·
1d
Β·
Discuss:
DEV
β‘
Event-Driven Architecture
From
Torsors
to
Topoi
: An Introduction with a View Toward $\Sigma$-Protocols in Cryptography
arxiv.org
Β·
2d
π
Distributed Systems
Kingston
reveals its toughest encrypted USB Drive yet β and it can even help you try and avoid
typos
techradar.com
Β·
5h
βοΈ
Prompt Engineering
Beijing wants its own
quantum-resistant
encryption standards rather than adopt
NIST
βs
csoonline.com
Β·
1d
π
Distributed Systems
One Platform.
Total
Application
Security.
proscan.one
Β·
7h
Β·
Discuss:
DEV
ποΈ
Backend Architecture
Quantum
Computers
Will Tap Out Before Breaking
Encryption
, Theory Claims
gizmodo.com
Β·
1d
Β·
Discuss:
Hacker News
π
Distributed Systems
Bitcoin Security Is a House of
Cards
youtube.com
Β·
1d
π
Distributed Systems
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help