Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Hash Functions, Public Key, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
76033
posts in
964.0
ms
I built a
cryptographic
memory layer for humans in Python tags: python,
opensource
, security, blockchain
dev.to
·
10h
·
Discuss:
DEV
📬
MessagePack
High‑Performance Cryptographic Hash Function Based on
Mersenne
Prime Field Arithmetic and Efficient Modular Reduction **Abstract**
Mersenne
primes
\(p=2^q-1\...
freederia.com
·
2d
🔨
SMHasher
Data protection in the age of artificial intelligence: why
transparency
, control, and
humanity
are now crucial
igorslab.de
·
3h
🛡️
AI Security
Jeffrey
Funk
.
Unicorns
, Hype, and Bubbles: A Guide to Spotting, Avoiding, and Exploiting Investment Bubbles in Tech
journals.sagepub.com
·
2h
📚
Technical Writing
Private Data Space Model
privatedata.space
·
3d
🔗
Intrusive Containers
Building "zero-gap"
secrets
for a
UGC
platform
news.ycombinator.com
·
1d
·
Discuss:
Hacker News
#️⃣
Perfect Hashing
Adaptive
Hashing
: Faster Hash Functions with Fewer
Collisions
arxiv.org
·
2d
·
Discuss:
Hacker News
#️⃣
Hash Tables
555-Based Square-Wave and
Triangle-Wave
Function Generator Build for
Beginners
hackaday.com
·
2h
🎮
QEMU TCG
HBMHCW
Addresses $370 Million Q1 2026 Crypto Theft Crisis with Multi-Layer Phishing Defense as Attacks
Escalate
smb.bogalusadailynews.com
·
1d
🔒
Security
Digital
Footprint
medium.com
·
6h
🔍
Digital Forensics
Securing
Hardware
For The Quantum Era
semiengineering.com
·
2d
🔐
Hardware Security
Telling the Story of
Chameleon
Hash
Functions: A 27-Year Review
eprint.iacr.org
·
3d
🐦
Cuckoo Hashing
Dot
Chain Special
Operators
yamlscript.org
·
1d
3️⃣
Three-Address Code
We have
broken
SHA-1
in practice
shattered.io
·
12h
·
Discuss:
Hacker News
⚡
xxHash
DNA
could
rival
computer chips for future data storage
earth.com
·
1d
🔢
Homomorphic Encryption
Raw
or
typed
ziggit.dev
·
19h
📚
Rkyv
Microsoft Releases
Crescent
Cryptographic
Library
i-programmer.info
·
2d
🔒
Tetragon
Fibonacci
number
certificates
johndcook.com
·
2d
·
Discuss:
Hacker News
⚡
xxHash
Top
Authentication
Techniques
to Build Secure Applications
blog.bytebytego.com
·
2d
🔒
Security
Explainer
:
XPC
eclecticlight.co
·
1d
🔐
Capability Systems
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help