Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Homomorphic Secret Sharing
Secure Computation, MPC, Privacy, Threshold Cryptography
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
143064
posts in
39.4
ms
A GPU
Microarchitecture
Optimized for Fully
Homomorphic
Encryption
semiengineering.com
·
3h
🔢
Homomorphic Encryption
A Critical Look into Threshold
Homomorphic
Encryption for Private Average
Aggregation
arxiv.org
·
3d
🔢
Homomorphic Encryption
An interactive intro to
Elliptic
Curve Cryptography (
ECC
)
growingswe.com
·
1d
·
Discuss:
Hacker News
🔢
Homomorphic Encryption
MOOving
to a self-hosted Bluesky
PDS
dbushell.com
·
2h
🏠
Self-Hosting
Quantum Information Processing with Finite Resources --
Mathematical
Foundations
dev.to
·
1d
·
Discuss:
DEV
⚛️
Quantum Computing
Additions,
Multiplications
, and the Interaction In-Between: Optimizing MPC Protocols via
Leveled
Linear Secret Sharing
eprint.iacr.org
·
5d
🔢
Homomorphic Encryption
fancy-cryptography/fancy-cryptography
: Deployments of
fancy
cryptography
github.com
·
2d
🔢
Homomorphic Encryption
What
Happens
When You Put “n” Billion
Weights
in Your RAM
pub.towardsai.net
·
4h
🧩
mimalloc
Distributed
Systems for
Fun
and Profit
book.mixu.net
·
1d
·
Discuss:
r/programming
🔄
Distributed Systems
Unlinkable
Inference
as a User Privacy Architecture
openanonymity.ai
·
1d
🔒
Differential Privacy
lahosken.san-francisco.ca.us
·
7h
🔢
Homomorphic Encryption
Show HN:
Cifer
, zero-key custody using threshold
cryptography
cifer-security.com
·
2d
·
Discuss:
Hacker News
⚖️
Consistent Hashing
Differentially Private
Truncation
of
Unbounded
Data via Public Second Moments
arxiv.org
·
2d
🔒
Differential Privacy
Scaling ML Inference on Databricks: Liquid or
Partitioned
?
Salted
or Not?
towardsdatascience.com
·
22h
📊
Vectorized Query Execution
Necessary and
Sufficient
Conditions for the
Existence
of Ideal Linear Secret Sharing Schemes for Arbitrary Access Structures
eprint.iacr.org
·
4d
🔢
Homomorphic Encryption
Why
Structured
Kernels
?
modular.com
·
2d
⚡
Hardware Acceleration
Building a Privacy-First Price
Alert
System: Zero
Cookies
, Full Trust
dev.to
·
6h
·
Discuss:
DEV
🔒
Rustls
Linkage
11011110.github.io
·
17h
📐
Computational Geometry
What is next in quantum
advantage
?
quantumfrontiers.com
·
15h
⚛️
Quantum Computing
The
Mystery
of
Skype
clevcode.org
·
11h
·
Discuss:
Hacker News
🔍
Reverse Engineering
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help