🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🧮 Homomorphic Encryption

Secure Computation, Privacy-Preserving Analytics, Encrypted Data Processing

Silicon-based reconfigurable and programmable all-optical signal processing chip
link.springer.com·2d·
Discuss: Hacker News
🔄Protocol Design
Researchers unlock hidden geometry of the heart to revolutionize ECG interpretation
medicalxpress.com·20h
🏥Medical Privacy
A deep dive into deeply recursive Go
mattermost.com·16h·
Discuss: Hacker News
⚙️Programming
JWT based Authentication from scratch
i.redd.it·17h·
Discuss: r/node
📜Smart Contracts
IBM Fundamentals: Gp Nodejs Perftest
ibm.com·1d·
Discuss: DEV
🤖AI
Faster Rates for Private Adversarial Bandits
machinelearning.apple.com·1d
🔐Zero-Knowledge Proofs
Applications Of Zero-Knowledge Proofs On Bitcoin
eprint.iacr.org·1d
🔐Zero-Knowledge Proofs
Yubi Whati? (YubiKeys, ECDSA, and X.509)
ram.tianon.xyz·2d
🔗Crypto
Towards an Efficient Shifted Cholesky QR for Applications in Model Order Reduction using pyMOR
arxiv.org·1d
🔧MLIR
Temporal Unlearnable Examples: Preventing Personal Video Data from Unauthorized Exploitation by Object Tracking
arxiv.org·1d
🌐Decentralized AI
IBM Fundamentals: Gp Js Flatten
dev.to·2d·
Discuss: DEV
🔗Crypto
Crypto Workers Tricked in Job Scams Involving New Malware Linked to North Korea
blogger.com·20h
🔗Crypto
AI, BCIs, and Digital Twins: The Real Tech Moonshots of 2025
hackernoon.com·1d
🛡️AI Safety
Preprints: Forecast-LLMs, Dream-Augmented Memory, and Behavioral Safety Mechanisms
reddit.com·17h·
Discuss: r/LLM
🛡️AI Safety
The power of SurrealDB embedded
dev.to·1d·
Discuss: DEV
⚙️Programming
Leaky chatbots: Understanding sensitive information disclosure in AI
scworld.com·1d·
Discuss: Hacker News
🛡️AI Safety
Rethinking the Privacy of Text Embeddings: A Reproducibility Study of "Text Embeddings Reveal (Almost) As Much As Text"
arxiv.org·1d
🔐Zero-Knowledge Proofs
Superimposed codes, take two
blog.sesse.net·3d
⚙️Programming
The Danish Sugar Beats Auction has a weird role in cryptography history
evervault.com·4d·
Discuss: Hacker News
🔄Protocol Design
Homeostatic Adaptation of Optimal Population Codes under Metabolic Stress
arxiv.org·1d
🔄Protocol Design
Loading...Loading more...
AboutBlogChangelogRoadmap