Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Algorithms, Public Key, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
120990
posts in
1.45
s
GUID
/
UUID
V7 - Unix Time-Ordered Identifier (Recommended)
guidsgenerator.com
·
2d
·
Discuss:
Hacker News
🔒
security
718093 - 01/21/2026
fda.gov
·
2d
🔌
Embedded Systems
An automated geometric space
curve
approach for designing dynamically
corrected
gates
nature.com
·
1d
🔌
Embedded Systems
Opus 4.6 Reasoning
Distill
3k
prompts
huggingface.co
·
2d
·
Discuss:
r/LocalLLaMA
🔤
c
How the GNU C Compiler became the
Clippy
of
cryptography
theregister.com
·
3d
·
Discuss:
Hacker News
,
r/programming
🔒
security
Show HN:
Mojic
– A C code
obfuscator
and encryption tool for source protection
amit.is-a.dev
·
3d
·
Discuss:
Hacker News
🔒
security
Deobfuscation
and Analysis of
Ring-1.io
back.engineering
·
3d
·
Discuss:
Lobsters
,
Hacker News
🔒
security
ssa1099
freetaxusa.com
·
2d
🔒
security
F# 10
news.ycombinator.com
·
2d
·
Discuss:
Hacker News
🐧
Linux
Best 15 IoT Projects Using
ESP32
for
Beginners
& Advanced Makers in 2026
makemindz.com
·
2d
·
Discuss:
r/coding
🔌
Embedded Systems
Cherry Tomatoes: A Brief Description and
Suitable
Varieties
for the Greenhouse
saahasindia.org
·
1d
🔤
c
Carryless
Pairing: Additive Pairing in the
Fibonacci
Basis
arxiv.org
·
2d
🔤
c
The 4 most common security risks when vibe coding your app—Martian
Chronicles
, Evil
Martians
’ team blog
evilmartians.com
·
1d
🔒
security
Analysis and
Vulnerabilities
in
zkLogin
eprint.iacr.org
·
1d
🔒
security
HELP
IRR
AP SEM idk if this is good according to the
rubric
apcentral.collegeboard.org
·
2d
·
Discuss:
r/APSeminar
🔤
c
Ethereum-Solidity Quiz
Q30
: What does
keccak256
() do?
dev.to
·
3d
·
Discuss:
DEV
🔒
security
Cyber Law and
Ethics
: Regulation of the
Connected
World
sonomarpa.sonoma.lib.ca.us
·
2d
🛡️
Cybersecurity
Penelope
Pendrick
and the Art of
Deceit
review
adventuregamehotspot.com
·
2d
🔤
c
Reuse of Public Keys Across
UTXO
and Account-Based
Cryptocurrencies
arxiv.org
·
2d
🔒
security
Top Links 1009 The phases of US wage
stagnation
and growth. Stress testing. Roman trade routes and existential
historicism
.
substackcdn.com
·
2d
·
Discuss:
Substack
🔤
c
Loading...
Loading more...
« Page 8
•
Page 10 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help