Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 ChaCha20
Stream Cipher, Cryptography, Performance, AEAD
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
146426
posts in
33.7
ms
The
185-Microsecond
Type
Hint
blog.sturdystatistics.com
·
6h
·
Discuss:
Lobsters
,
Hacker News
,
r/programming
🌊
Glommio
Qeltrix
V6
— Network-Native Encrypted Streaming Container
github.com
·
1d
·
Discuss:
DEV
🛡️
AMD SEV
NSHEDB
: Noise-Sensitive
Homomorphic
Encrypted Database Query Engine
arxiv.org
·
23h
🔢
Homomorphic Encryption
Show HN: An
Auditable
Decision Engine for AI Systems
maelstrom.ghostlogic.tech
·
2h
·
Discuss:
Hacker News
🛡️
AI Security
Best
Encryption
Software of 2026
theaisurf.com
·
17h
🔒
Security
The
Math
Behind the Match: Building Production Search for People
Names
hackernoon.com
·
8h
🔍
Miniselect
Lomas
: An Open-Source Platform for Confidential Analysis of Data (
dgwk2026
)
cdn.media.ccc.de
·
22h
🔒
Digital Privacy
How to
Hash
Passwords in Python and
Encrypt
Sensitive Data the Right Way
dev.to
·
19h
·
Discuss:
DEV
🔐
Cryptography
komrad36/CRC
: Fastest
CRC32
for x86, Intel and AMD, + comprehensive derivation and discussion of various approaches
github.com
·
1d
#️⃣
Perfect Hashing
🐥 Optimizing
nested
array operations in PHP: from O(
3n
) to O(n)
yellowduck.be
·
1d
🔄
Salsa
A GPU
Microarchitecture
Optimized for Fully
Homomorphic
Encryption
semiengineering.com
·
1d
🔢
Homomorphic Encryption
The Spring Festival AI red
envelopes
are
essentially
a large-scale micro-data harvesting operation.
eu.36kr.com
·
3h
🛡️
AI Security
OpenAI Codex-Spark Achieves Ultra-Fast Coding
Speeds
on
Cerebras
Hardware
infoq.com
·
13h
⚡
Hardware Acceleration
CyberStrikeAI
tool
adopted
by hackers for AI-powered attacks
bleepingcomputer.com
·
4h
🛡️
AI Security
Why We Built (and
Open-Sourced
) a New
RoughTime
Implementation
blog.sturdystatistics.com
·
3h
·
Discuss:
r/programming
🐅
TigerBeetle Protocol
Show HN:
Veracity-Cryptographic
data integrity proofs for AI compliance
veracity.resethiq.com
·
1d
·
Discuss:
Hacker News
🌳
Merkle Trees
Programming
in K
news.ycombinator.com
·
1d
·
Discuss:
Hacker News
🔢
algo
Machine Learning Threat
Roundup
hiddenlayer.com
·
1d
🔓
Binary Exploitation
TaCarla
: A comprehensive
benchmarking
dataset for end-to-end autonomous driving
arxiv.org
·
23h
🎨
Chroma
Beyond
Pandas
:
Architecting
High-Performance Python Pipelines
hackernoon.com
·
8h
🐙
Benthos
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help