Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Hash Functions, Public Key, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74301
posts in
1.32
s
Signing JSON Web
Tokens
: Algorithm
Tradeoffs
, Performance, and Security
ciamweekly.substack.com
·
2h
·
Discuss:
Substack
#️⃣
Hash Tables
Main
Content ||
Math
∩ Programming
jeremykun.com
·
18h
📊
Algorithms
Mastering
Authentication
in MCP: An AI Engineer’s Comprehensive Guide
pub.towardsai.net
·
11h
🔑
Kanidm
Securing
IoT devices: why
passwords
are not enough
iotinsider.com
·
1d
🔒
Security
How the GNU C Compiler became the
Clippy
of
cryptography
theregister.com
·
4h
·
Discuss:
Hacker News
🎯
Escape Analysis
The End of
IPFS
: Centralized Pinning Single Points of Failure, Cryptographic Hash Backdoors, DDoS Exploitation, and Gossip-Based Distributed Node
Eradication
zenodo.org
·
18h
·
Discuss:
Hacker News
🌐
IPFS
I built a
cryptographic
memory layer for humans in Python tags: python,
opensource
, security, blockchain
dev.to
·
1d
·
Discuss:
DEV
📬
MessagePack
Identity Access Management:
pillar
of security and
compliance
clever.cloud
·
2h
🔑
Kanidm
A
Unified
Framework for LLM
Watermarks
arxiv.org
·
11h
👆
Fingerprinting
Protecting
Digital Assets: The Best Crypto
Wallets
for Long-Term Investors
little-money-matters.blogspot.com
·
12h
🔐
Hardware Security
High‑Performance Cryptographic Hash Function Based on
Mersenne
Prime Field Arithmetic and Efficient Modular Reduction **Abstract**
Mersenne
primes
\(p=2^q-1\...
freederia.com
·
4d
🔨
SMHasher
NEWS
ROUNDUP
digitalforensicsmagazine.com
·
5h
🔍
Digital Forensics
Why machine-to-machine
payments
are the new
electricity
for the digital age
finance.yahoo.com
·
11h
🔒
Two-Phase Locking
Secrets management with
SOPS
Guix --
fishinthecalculator
fishinthecalculator.me
·
1d
🛡️
AMD SEV
Fibonacci
numbers and time-space
tradeoffs
johndcook.com
·
1d
⚖️
Y-Fast Tries
Jeffrey
Funk
.
Unicorns
, Hype, and Bubbles: A Guide to Spotting, Avoiding, and Exploiting Investment Bubbles in Tech
journals.sagepub.com
·
1d
📚
Technical Writing
Data protection in the age of artificial intelligence: why
transparency
, control, and
humanity
are now crucial
igorslab.de
·
1d
🛡️
AI Security
Visa Says Cybersecurity
Decides
Who Wins Digital
Commerce
pymnts.com
·
7h
🔒
Security
Adaptive
Hashing
: Faster Hash Functions with Fewer
Collisions
arxiv.org
·
3d
·
Discuss:
Hacker News
#️⃣
Hash Tables
Home
eventhorizonarchitecture.org
·
20h
📡
Event-Driven Architecture
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help