🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Zero-Knowledge Proofs

ZK-SNARKs, Privacy, Cryptographic Protocols, Verifiable Computation

MoEcho: Exploiting Side-Channel Attacks to Compromise User Privacy in Mixture-of-Experts LLMs
arxiv.org·4h
🧮Homomorphic Encryption
Improve Data Integrity and Security with Accelerated Hash Functions and Merkle Trees in cuPQC 0.4
developer.nvidia.com·1d
🧮Homomorphic Encryption
Making Illegal States Unrepresentable in Kotlin
dev.to·17h·
Discuss: DEV
⚙️Programming
PQ-STAR: Post-Quantum Stateless Auditable Rekeying
eprint.iacr.org·3d
🧮Homomorphic Encryption
The Baby Paradox in Haskell
blog.jle.im·15h·
Discuss: Lobsters, Hacker News
✅Formal Verification
Securing private data at scale with differentially private partition selection
research.google·1d
🧮Homomorphic Encryption
Imperfect light sources achieve new benchmark in secure quantum communication
phys.org·12h
🧮Homomorphic Encryption
The Supply Chain Paradox: When “Hardened” Images Become a Vendor Lock-in Trap
docker.com·1d
🔒Hardware Security
CRYSTALS - The Gently Introduction
dev.to·13h·
Discuss: DEV
🧮Homomorphic Encryption
Free Theory of Computation text
reddit.com·19h·
Discuss: r/compsci
🧮Homomorphic Encryption
Show HN: Changefly ID + Anonymized Identity and Age Verification
changefly.com·12h·
Discuss: Hacker News
🧮Homomorphic Encryption
Zed fork focused on privacy and being local-first
github.com·1d·
Discuss: Hacker News
🔗Crypto
On the protection of Privacy.
eazyizzie.dev·13h
🏥Medical Privacy
Simplify multi-tenant encryption with a cost-conscious AWS KMS key strategy
aws.amazon.com·10h
🔒Hardware Security
Locally Differentially Private Multi-Sensor Fusion Estimation With System Intrinsic Randomness
arxiv.org·4h
🧮Homomorphic Encryption
ByteDance Unleashes Seed-OSS-36B: The 512K-Token Open-Source Heavyweight
huggingface.co·1d·
Discuss: r/AIGuild
🔗Crypto
Implementing Lock-free channels using pointer tagging in Databend's query engine written in Rust
databend.com·1d·
Discuss: r/rust
⚙️Programming
Malicious Go Module Disguised as SSH Brute Forcer Exfiltrates Credentials via Telegram
socket.dev·16h·
Discuss: Hacker News
🔗Crypto
Will the Stablecoin Industry’s Compliance Dilemma Be Solved in Our Lifetime?
pymnts.com·16h
🔒Hardware Security
What's the best practice to encrypt password?
reddit.com·4h·
Discuss: r/golang
🔗Crypto
Loading...Loading more...
AboutBlogChangelogRoadmap