Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Homomorphic Secret Sharing
Secure Computation, MPC, Privacy, Threshold Cryptography
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74166
posts in
776.7
ms
Enigma
: Decentralized Computation Platform with
Guaranteed
Privacy
dev.to
·
2d
·
Discuss:
DEV
🔢
Homomorphic Encryption
Main
Content ||
Math
∩ Programming
jeremykun.com
·
9h
📊
Algorithms
Mastering
Authentication
in MCP: An AI Engineer’s Comprehensive Guide
pub.towardsai.net
·
1h
🔑
Kanidm
FHAIM
: Fully
Homomorphic
AIM For Private Synthetic Data Generation
arxiv.org
·
3d
🔢
Homomorphic Encryption
Secrets management with
SOPS
Guix --
fishinthecalculator
fishinthecalculator.me
·
21h
🛡️
AMD SEV
Hitting
1,000
tokens
per second on a single RTX 5090
blog.alpindale.net
·
8h
·
Discuss:
Hacker News
📍
CPU Pinning
Fine‑Grained Differential Privacy for
Genomic
Risk Prediction in Multi‑Tenant
Telehealth
Platforms **Abstract**
Telehealth
services increasingly integrate ge...
freederia.com
·
3d
🔢
Homomorphic Encryption
gharasathi
(
घर
ासाठी) — A Privacy-First Household AI Running on a $200 Mini PC
amazon.com.au
·
1d
·
Discuss:
DEV
🦙
Ollama
Efficient and High-Fidelity Entanglement in Cavity
QED
without High
Cooperativity
link.aps.org
·
1d
⚛️
Quantum Computing
An
attempt
at a
First-Proof
AI challenge
abhvio.us
·
20h
·
Discuss:
Hacker News
💃
Dancing Links
An API for
deterministic
procedural
generation (same seed = same output)
goldenseed-api.vercel.app
·
12h
·
Discuss:
r/proceduralgeneration
🎲
Deterministic Simulation
Privacy-preserving data analysis using a
memristor
chip with
colocated
authentication and processing
science.org
·
2d
🏷️
Memory Tagging
The End of
IPFS
: Centralized Pinning Single Points of Failure, Cryptographic Hash Backdoors, DDoS Exploitation, and Gossip-Based Distributed Node
Eradication
zenodo.org
·
9h
·
Discuss:
Hacker News
🌐
IPFS
A
Proof
of P =
NP
dev.to
·
6h
·
Discuss:
DEV
💃
Dancing Links
Every Man a
Microservice
grantslatton.com
·
13h
🏗️
System Design
Fibonacci
numbers and time-space
tradeoffs
johndcook.com
·
17h
⚖️
Y-Fast Tries
One-Way Quantum Secure Direct Communication with Choice of
Measurement
Basis
as the Secret
arxiv.org
·
3d
⚛️
Quantum Computing
Building "zero-gap"
secrets
for a
UGC
platform
news.ycombinator.com
·
2d
·
Discuss:
Hacker News
#️⃣
Perfect Hashing
Three-Round (Robust) Threshold
ECDSA
from Threshold
CL
Encryption
eprint.iacr.org
·
3d
🏹
Robin Hood Hashing
ERC-8004
: A
Trustless
Agent Standard for On-Chain AI in Avalanche C-Chain
medium.com
·
1d
🗳️
Raft Consensus
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help