Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 ChaCha20
Stream Cipher, Cryptography, Performance, AEAD
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
73225
posts in
936.3
ms
Haplotype-resolved chromosome-level genome assembly of an
autohexaploid
oil camellia tree Camellia
osmantha
nature.com
·
1d
🔄
Burrows-Wheeler Transform
OFP
’s data server killers aiming for AI system scalability and efficiency
nirvana
blocksandfiles.com
·
1d
📋
Columnar Storage
What AI Security Research Looks Like When It Works
aisle.com
·
6h
🛡️
AI Security
Lean
4 and the Curry–Howard
correspondence
wildonblog.wordpress.com
·
22h
∘
Category Theory
Shane
Borden
: Do PostgreSQL Sub-Transactions Hurt Performance?
shaneborden.com
·
1h
🐘
PostgreSQL Internals
Rare Events and
Griffiths
Phases
in Topological Quantum Error Correction
arxiv.org
·
12h
⚛️
Quantum Computing
Nextcloud
with fully
encrypted
storage
justinscholz.de
·
1d
🔒
Digital Privacy
Expectation
and
Copysets
buttondown.com
·
22h
·
Discuss:
Hacker News
🔐
Homomorphic Secret Sharing
ByteDance
Seed
seed.bytedance.com
·
1d
💡
Photon
Autocrypt
v2 - Post-Quantum and Reliable
Deletion
for Internet Messaging
autocrypt2.org
·
3d
🛡️
AMD SEV
Your
VCL
App: 4x to 11x Faster Math Performance with
Elements
blogs.remobjects.com
·
1d
·
Discuss:
Hacker News
🛣️
Highway
Struggling
Towards an
Algebraic
Theory of Music
reasonablypolymorphic.com
·
3h
·
Discuss:
Hacker News
∘
Category Theory
Just-in-Time
Ontological
Reframing
: Teaching Gemini to Route Around Its Own Safety Infrastructure
recursion.wtf
·
21h
🔺
Delta Lake
Zero crashes, zero
compromises
: inside the
HAProxy
security audit
haproxy.com
·
1d
🔒
Tetragon
Why
securing
AI model
weights
isn’t enough
the-substrate.net
·
20h
·
Discuss:
Hacker News
🛡️
AI Security
Telling the Story of
Chameleon
Hash
Functions: A 27-Year Review
eprint.iacr.org
·
6d
🐦
Cuckoo Hashing
We hid
backdoors
in
binaries
– Opus 4.6 found 49% of them
quesma.com
·
5h
·
Discuss:
Hacker News
,
r/ClaudeAI
,
r/programming
🔓
Binary Exploitation
Deep Dive into New
XWorm
Campaign Utilizing Multiple-Themed
Phishing
Emails
fortinet.com
·
3h
🔓
Binary Exploitation
Faster
AI Training
Unlocked
With New System For Massive Language Models
quantumzeitgeist.com
·
1d
🤖
TVM
Hacking
the
Maclock
taoofmac.com
·
9h
💾
Retro Computing
Loading...
Loading more...
« Page 1
•
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help