Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Hash Functions, Public Key, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
76325
posts in
796.9
ms
Keys
!
biggergig.com
·
5d
⌨️
Mechanical Keyboards
Generate
SM2
Key Pair Using Key Parameters for Encryption and
Decryption
dev.to
·
3d
·
Discuss:
DEV
#️⃣
Perfect Hashing
McDonald's is not lovin' your
bigmac
,
happymeal
, and mcnuggets passwords
theregister.com
·
5d
🔒
Security
Things that Matter --
Identifying
Interactions and IoT Device Types in
Encrypted
Matter Traffic
arxiv.org
·
4d
🔒
Digital Privacy
Streamlining
Authentication Flows in
Microservices
Using Go
dev.to
·
4d
·
Discuss:
DEV
🐹
golang
Valuable
News
vermaden.wordpress.com
·
5d
🔍
eBPF
An introduction to local
differential
privacy
protocols
using block designs
arxiv.org
·
3d
🔒
Differential Privacy
Best Computer Security Software
theaisurf.com
·
5d
🌐
Network Security
Being better with
passwords
fastmail.com
·
6d
🔒
Security
Privacy | The Area News
areanews.com.au
·
6d
🔒
Digital Privacy
Quantum
Sensing
Will Test Legal
Frameworks
for Privacy
techpolicy.press
·
5d
·
Discuss:
Hacker News
🔒
Digital Privacy
**Abstract:** Protein
folding
remains a critical challenge in computational
biology
with implications for drug discovery and materials science. This paper in...
freederia.com
·
3d
🧬
Computational Biology
What
Color
is Your
Function
?
journal.stuffwithstuff.com
·
5d
λ
Functional Programming
nilpunch/massive-ecs
:
Bitset-based
ECS with rollbacks. C# library and Unity package.
github.com
·
3d
🎮
Bevy ECS
Show HN: Gateway – An open-source proxy to
securely
handle
BYOK
keys
github.com
·
3d
·
Discuss:
Hacker News
🚦
Traefik
Converting data to
hexadecimal
outputs
quickly
lemire.me
·
5d
·
Discuss:
Hacker News
📏
Run-Length Encoding
"Five-Point
Haskell
": Total
Depravity
(and Defensive Typing)
blog.jle.im
·
5d
·
Discuss:
Lobsters
,
Hacker News
,
r/programming
👻
Phantom Types
Digital Services
Agreement
mtb.com
·
6d
⏳
etcd Lease
TrustTunnel
is an open-source, high-performance VPN protocol that's harder to
detect
and block
cnx-software.com
·
5d
·
Discuss:
Hacker News
🔐
WireGuard
Formally
Verifying
PBS Kids with
Lean4
shadaj.me
·
5d
·
Discuss:
Hacker News
🌊
CALM Theorem
Loading...
Loading more...
« Page 10
•
Page 12 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help