Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Algorithms, Public Key, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
120442
posts in
1.94
s
Making
Waffles
with Group Theory
hmpcabral.com
·
2d
·
Discuss:
Hacker News
🔤
c
A
dataset
collected
in real-world industrial control systems for network attack detection
nature.com
·
2d
🌐
Network Security
Can
Hardware
Save Us from Software?
lesswrong.com
·
3d
🔌
Embedded Systems
Designing and Using
Combinators
: The
Essence
of Functional Programming
cse.chalmers.se
·
2d
·
Discuss:
Hacker News
🔧
Assembly Language
Nextcloud
with fully
encrypted
storage
justinscholz.de
·
3d
🔒
security
Wikipedia
en.wikipedia.org
·
3d
🔤
c
DNS-PERSIST-01
; Handling Domain Control Validation in a short-lived
certificate
World
scotthelme.co.uk
·
2d
·
Discuss:
Hacker News
🌐
Network Security
Sound and Practical Points-To Analysis for
Incomplete
C
Programs
[pdf]
sjalander.com
·
2d
·
Discuss:
Hacker News
🔤
c
Report on the
subject
of
Manufacturers
(1791) [pdf]
constitution.org
·
2d
·
Discuss:
Hacker News
🔤
c
Differential
Logic
• 4
inquiryintoinquiry.com
·
4d
🔤
c
What is your gaming ‘Hot Take’ that you never really see other people have too?
i.redd.it
·
1d
·
Discuss:
r/TwoBestFriendsPlay
🔒
security
adrianosela/tsdmg
: Tailscale Domain Management Gateway: allow Tailscale nodes to retrieve public (Let's Encrypt) TLS certificates for custom domains.
github.com
·
2d
·
Discuss:
Hacker News
🐧
Linux
Malicious
Private Set Union with
Two-Sided
Output
eprint.iacr.org
·
3d
🔒
security
IPBAC
: Interaction
Provenance-Based
Access Control for Secure and Privacy-Aware Systems
arxiv.org
·
2d
🌐
Network Security
The
Immutable
Ledger
: Data Integrity Through TypeScript & Design Patterns
dev.to
·
2d
·
Discuss:
DEV
🔒
security
The
Conspiracy
vs. Reality is getting out of
HAND
.
i.redd.it
·
1d
·
Discuss:
r/MurderedByWords
🔒
security
Reverse Online
Guessing
Attacks on
PAKE
Protocols
arxiv.org
·
2d
🔒
security
maja0027/xi-lang
: A binary graph-based programming language designed for AI authorship, machine execution, and mathematical
completeness
.
github.com
·
1d
·
Discuss:
Hacker News
🔧
Assembly Language
Nested
MuSig2
eprint.iacr.org
·
1d
🔤
c
I built a
cryptographic
memory layer for humans in Python tags: python,
opensource
, security, blockchain
dev.to
·
4d
·
Discuss:
DEV
🔒
security
Loading...
Loading more...
« Page 10
•
Page 12 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help