Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Hash Functions, Public Key, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
171033
posts in
66.8
ms
Quick Draw Queries: Lightweight
Searchable
Public-key
Ciphertexts
with Hidden Structures via Non-Interactive Key Exchange
🔢
Homomorphic Encryption
eprint.iacr.org
·
4d
Public Key Encryption from High-Corruption
Constraint
Satisfaction
Problems
🔢
Homomorphic Encryption
arxiv.org
·
17h
Vibhor
Kumar: column_
encrypt
v4.0: A Simpler, Safer Model for Column-Level Encryption in PostgreSQL
🔢
Homomorphic Encryption
vibhorkumar.wordpress.com
·
2d
A
Cryptography
Engineer’s Perspective on Quantum Computing
Timelines
⚛️
Quantum Computing
discuss.privacyguides.net
·
1d
Towards Post-Quantum
Cryptography
in
TLS
(2019)
🔢
Homomorphic Encryption
blog.cloudflare.com
·
6d
·
Hacker News
Lightweight multi-client
order-revealing
encryption with limited
leakage
⚖️
Consistent Hashing
sciencedirect.com
·
1d
Hashing
vs
Encryption
: What’s the Difference and Which One Should You Use?
⚡
xxHash
medium.com
·
4d
Yikes
, Encryption’s
Y2K
Moment is Coming Years Early
🔒
Digital Privacy
eff.org
·
4d
·
Hacker News
Quantum cryptanalysis of
SPN
ciphers
with known plaintext
⚛️
Quantum Computing
nature.com
·
6d
A
Survey
on the Applications of Zero-Knowledge
Proofs
🌳
Merkle Trees
arxiv.org
·
17h
Java
and Post-Quantum
Cryptography
⚛️
Quantum Computing
inside.java
·
6d
BioZero
: Privacy-Preserving and Publicly Verifiable On-Chain Biometric Authentication via
Homomorphic
Commitments and Zero-Knowledge Proofs
🔐
Homomorphic Secret Sharing
arxiv.org
·
17h
Post-Quantum
Cryptography-Based
Bidirectional
Authentication Key Exchange Protocol and Industry Applications: A Case Study of Instant Messaging
⚛️
Quantum Computing
arxiv.org
·
1d
Efficient
Partially
Blind Signatures from
Isogenies
🔢
Homomorphic Encryption
eprint.iacr.org
·
6d
Public Key vs Private Key:
Differences
,
Uses
, and How They Work
🔒
Digital Privacy
medium.com
·
3d
Stringology-Based
Cryptanalysis for
EChaCha20
Stream Cipher
🔐
ChaCha20
arxiv.org
·
1d
Efficient e = 3 Threshold RSA via Integer
Coordinates
for Intel
SGX
🔢
Homomorphic Encryption
eprint.iacr.org
·
6d
Breaking Optimized
HQC
: The First Cache-Timing Full
Decryption
Oracle Key-Recovery Attack in Post-Quantum Cryptography
⚛️
Quantum Computing
eprint.iacr.org
·
6d
A
Cryptography
Engineer’s Perspective on Quantum Computing
Timelines
⚛️
Quantum Computing
discuss.privacyguides.net
·
5d
A
Constructive
Treatment of
Authentication
🔑
Kanidm
eprint.iacr.org
·
5d
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help