Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π Cryptography
Encryption, Hash Functions, Public Key, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
135042
posts in
40.0
ms
Understanding Cryptography β From
Established
Symmetric and Asymmetric
Ciphers
to Post-Quantum Algorithms
cryptography-textbook.com
Β·
2d
Β·
Discuss:
Hacker News
π’
Homomorphic Encryption
I built an open-source,
AES-256
encrypted
Home Inventory system using only AI (and I don't know how to code)
github.com
Β·
1d
Β·
Discuss:
r/selfhosted
π
Pulsar
NI-DKG
: Non-Interactive Distributed Key Generation Using Blockchain and Zero-Knowledge
Proofs
eprint.iacr.org
Β·
2d
π’
Homomorphic Encryption
What Is
Threshold
Encryption
?
hackernoon.com
Β·
1d
π
Security
Linux fans wonβt
admit
it, but Windows wins on these 3 security
fronts
howtogeek.com
Β·
6h
π
Capability Systems
Hashing Is Not Encryption: A Practical Guide to
SHA-256
,
MD5
, and When to Use Each
zovo.one
Β·
2d
Β·
Discuss:
DEV
β‘
xxHash
One Key Good, L Keys Better: List
Decoding
Meets Quantum Privacy
Amplification
arxiv.org
Β·
2d
π
Homomorphic Secret Sharing
LSB
: A Lightweight Scalable BlockChain for
IoT
Security and Privacy
dev.to
Β·
1d
Β·
Discuss:
DEV
βοΈ
Blockchain
Frostsnap
Design Decisions -- No
PINs
, no secure element, no security theatre
frostsnap.com
Β·
16h
π
Hardware Security
How I Found a
Hardcoded
RSA
Private Key in a Major Crypto Exchangeβs Frontend
infosecwriteups.com
Β·
15h
π
eBPF Verifier
Watch
Cryptography
Happen: A Terminal Animation for
Threshold
Signatures
eric.mann.blog
Β·
2d
Β·
Discuss:
Hacker News
π¦
Falco
Security
Assurance
and Security
Operations
infosec.mozilla.org
Β·
2d
π
Security
Pawel
Sobczak
on Why Digital Identity Matters More Than AI for Blockchain
ccn.com
Β·
2d
π
Digital Privacy
xero/leviathan-crypto: Zero-dependency WebAssembly cryptography library for TypeScript: Serpent-256, XChaCha20-Poly1305, SHA-2/3, HMAC,
HKDF
, and Fortuna
CSPRNG
, with a strictly typed API built on vector-verified primitives.
github.com
Β·
3d
Β·
Discuss:
Lobsters
,
Hacker News
π
ChaCha20
New Approaches to Zero-Knowledge
SNARG
Constructions
eprint.iacr.org
Β·
2d
π
Lock-Free Programming
Garb
:
Cipher
uncrate.com
Β·
2d
π’
Homomorphic Encryption
Vector Search and
Queryable
Encryption
in .NET: Engineering Secure AI Systems at Scale
dev.to
Β·
1d
Β·
Discuss:
DEV
π’
Homomorphic Encryption
Quantum cryptography
pioneers
win Turing Award for
unhackable
encryption breakthrough
techspot.com
Β·
2d
βοΈ
Quantum Computing
NANOZK
:
Layerwise
Zero-Knowledge Proofs for Verifiable Large Language Model Inference
arxiv.org
Β·
2d
π
Homomorphic Secret Sharing
The
HackerNoon
Newsletter: What Is
Threshold
Encryption? (3/21/2026)
hackernoon.com
Β·
1d
π‘οΈ
AMD SEV
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help