Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Homomorphic Secret Sharing
Specific
Secure Computation, MPC, Privacy, Threshold Cryptography
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
121484
posts in
23.1
ms
Privacy-Enhancing
Encryption
in Data Sharing: A Survey on Security, Performance and
Functionality
🔒
Digital Privacy
arxiv.org
·
3d
·
…
Towards Formal Security
Proofs
of
MQOM
🔢
Homomorphic Encryption
eprint.iacr.org
·
2d
·
…
Storage solutions with
Midnight
-
handling
off-chain data with privacy
🌐
IPFS
dev.to
·
15h
·
DEV
·
…
Meeting where AI
eyes
can't
follow
🐦
Cuckoo Hashing
blog.voboda.com
·
1d
·
…
R3DRUN3/postfetch
: like fastfetch but for security and privacy.
🦅
Falco
github.com
·
1d
·
r/commandline
·
…
SuperDP
: Differential Privacy
Refutation
via Supermartingales
🔒
Differential Privacy
arxiv.org
·
3d
·
…
Privacy-Preserving Active Learning for wildfire
evacuation
logistics networks under real-time policy
constraints
🔒
Differential Privacy
dev.to
·
1d
·
DEV
·
…
On the Security of
MPC-in-the-Head
Signatures with Correlated
GGM
Trees
📡
Van Jacobson Channels
eprint.iacr.org
·
5d
·
…
Key-Embedded Privacy for Decentralized AI in
Biomedical
Omics
🔢
Homomorphic Encryption
arxiv.org
·
2d
·
…
The Black Box of Privacy:
Unlocking
"
Confidential
Computing" in AI
🛡️
AI Security
dev.to
·
5d
·
DEV
·
…
Breaking the One-Way Property of a
SHA-3
Implementation via Fault Injection: Key Recovery Attacks on Post-Quantum Digital
Signatures
🔨
SMHasher
eprint.iacr.org
·
3d
·
…
Privacy-Preserving
Iris
Recognition: Performance Challenges and Outlook
🔢
Homomorphic Encryption
arxiv.org
·
2d
·
…
On the Optimal Number of
Grids
for
Differentially
Private Non-Interactive $K$-Means Clustering
📐
Computational Geometry
arxiv.org
·
2d
·
…
Haechi
: Simple Commitment-based
Keyless
In-person Verifiable Elections
🔢
Homomorphic Encryption
eprint.iacr.org
·
6d
·
…
How Enterprise Wallet Infrastructure Actually Works:
MPC
, Custody Models, and Why
MetaMask
Was Never the Answer
📋
etcd
dev.to
·
5d
·
DEV
·
…
Unsafe2Safe
: Controllable Image
Anonymization
for Downstream Utility
🔒
Digital Privacy
arxiv.org
·
2d
·
…
Privacy Guard & Token
Parsimony
by Prompt and Context Handling and LLM
Routing
🔒
Tetragon
arxiv.org
·
1d
·
…
zk-X509
: Privacy-Preserving On-Chain Identity from Legacy
PKI
via Zero-Knowledge Proofs
🔒
Digital Privacy
arxiv.org
·
6d
·
…
TAMI-MPC
:Trusted Acceleration of Minimal-Interaction
MPC
for Efficient Nonlinear Inference
🎲
Deterministic Simulation
arxiv.org
·
6d
·
…
Privacy-Accuracy Trade-offs in High-Dimensional
LASSO
under
Perturbation
Mechanisms
🔒
Differential Privacy
arxiv.org
·
3d
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help