🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Zero-Knowledge Proofs

ZK-SNARKs, Privacy, Cryptographic Protocols, Verifiable Computation

Probability-Raising Causality for Uncertain Parametric Markov Decision Processes with PAC Guarantees
arxiv.org·1d
🛡️AI Safety
$BTC Bitcoin White Paper Annotated
bitcoinpaper.tech·4d·
Discuss: Hacker News
🔗Crypto
Subgraph Counting under Edge Local Differential Privacy Based on Noisy Adjacency Matrix
arxiv.org·2d
🧮Homomorphic Encryption
# Build an AI Viral Prediction Tool with Real-Time Streaming and MCP Integration in 20 Minutes
dev.to·1d·
Discuss: DEV
🤖AI
TL;DR: Moonshot AI dropped an open-source LLM called Kimi K2, and it's supposedly as good as Claude Sonnet 4.0 for text stuff. But, big BUT, Moonshot AI is Chin...
best-ai-tools.org·18h·
Discuss: r/findAIwithAI
🤖AI
DSA Problem Solving — Day 4 and 5
dev.to·19h·
Discuss: DEV
⚙️Programming
Non-Profiled Higher-Order Side-Channel Attacks against Lattice-Based Post-Quantum Cryptography
eprint.iacr.org·4d
🧮Homomorphic Encryption
This one line of code for Grok AI was more dangerous to the ruling elite than Iran continuing its nuclear program:
threadreaderapp.com·2d
⚙️Programming
From Chaos to Clean: Implementing Hexagonal Architecture in PHP
github.com·20h·
Discuss: DEV
⚙️Programming
⚖️ Proof of Stake Explained: Ethereum’s Guardians of the Blockchain
dev.to·1d·
Discuss: DEV
🔗Crypto
Python Fundamentals: bounded typevar
dev.to·1d·
Discuss: DEV
⚙️Programming
Still figuring out cloud networking? Here's how I finally understood VPCs
reddit.com·1d·
Discuss: r/devops
🔄Protocol Design
55 advanced Kubernetes interview questions
dev.to·19h·
Discuss: DEV
📜Smart Contracts
On the Inherent Privacy of Zeroth Order Projected Gradient Descent
arxiv.org·3d
🌐Decentralized AI
A Practical Guide to Go’s Fan-in and Fan-out Concurrency Patterns
dev.to·1d·
Discuss: DEV
🔧MLIR
Wallets as Universal Access Devices
arxiv.org·2d
🔗Crypto
Building Cliano: A Terminal Piano in Rust
dev.to·16h·
Discuss: DEV
⚙️Programming
Understanding Chain-of-Thought in LLMs through Information Theory
arxiv.org·1d
🔧MLIR
Towards an Efficient Shifted Cholesky QR for Applications in Model Order Reduction using pyMOR
arxiv.org·1d
🔧MLIR
The Passwordless Future: A Security Upgrade or a Costly Mistake?
dev.to·1d·
Discuss: DEV
🔗Crypto
Loading...Loading more...
AboutBlogChangelogRoadmap