Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Algorithms, Public Key, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
122558
posts in
588.0
ms
ITSAKE
: an
unconditionally
secure authenticated key establishment protocol
eprint.iacr.org
·
2d
🔒
security
Show HN: The
GPG
Guide – Practical
OpenPGP
for 2026
leanpub.com
·
2h
·
Discuss:
Hacker News
🐧
Linux
How ‘effectively zero-knowledge’
proofs
could transform
cryptography
scientificamerican.com
·
1d
🔒
security
What is the Crypto
Architecture
Kit
?
dev.to
·
16h
·
Discuss:
DEV
🌐
Network Security
Crypto Research Tools
medium.com
·
1h
🛡️
Cybersecurity
CryptoCatch
:
Cryptomining
Hidden Nowhere
arxiv.org
·
12h
🔒
security
RFC 4262: X.509 Certificate Extension for
Secure/Multipurpose
Internet Mail Extensions (
S/MIME
) Capabilities
rfc-editor.org
·
22h
🔌
Embedded Systems
NBDE
(Network-Bound
Disk
Encryption) Technology
access.redhat.com
·
11h
🌐
Network Security
Don't pass on small block
ciphers
00f.net
·
2d
🔒
security
Differential
Logic
• 6
inquiryintoinquiry.com
·
1h
🔤
c
Demystifying JOSE, the JWT Family: JWS, JWE,
JWA
, and
JWK
Explained
auth0.com
·
14h
🌐
Network Security
SCA-MQDSA
: Side-Channel Analysis of Multivariate Digital Signature Implementations
eprint.iacr.org
·
1d
🔌
Embedded Systems
The Solution to Prompt Injection: Mapping
SSL/TLS
Trust Architecture onto LLMs [pdf]
solvingpromptinjection.com
·
14h
·
Discuss:
Hacker News
🔒
security
Main
Content ||
Math
∩ Programming
jeremykun.com
·
3d
🌐
Network Security
Fully Countering
Trusting
Trust through Diverse Double-Compiling (
DDC
) - Countering Trojan Horse attacks on Compilers
dwheeler.com
·
1d
🔒
security
KeyleSSH
: A New PAM Concept for IT
Admins
dev.to
·
15h
·
Discuss:
DEV
🔒
security
Computer
Forensic
Tools Comparison
Chart
2026
cybertriage.com
·
10h
🛡️
Cybersecurity
Various levels of authentication for
gated
medical content on
pharmaceutical
websites
thomasrigby.com
·
2h
🔒
security
On Crypto
Cycles
thediff.co
·
2d
🔌
Embedded Systems
sshca
: tool to manage SSH CA
certificates
doc.liw.fi
·
8h
🔒
security
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help