Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Homomorphic Secret Sharing
Secure Computation, MPC, Privacy, Threshold Cryptography
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
104628
posts in
1.46
s
Privacy-Preserving
Coding
Schemes
for Multi-Access Distributed Computing Models
arxiv.org
·
1d
🔄
Anti-Entropy
Introducing new token
formats
and secret
scanning
vercel.com
·
1d
🔒
Security
Chernoff
Information Bottleneck for
Covert
Quantum Target Sensing
link.aps.org
·
17h
⚛️
Quantum Computing
The “Node 1.9”
Miracle
: How to Turn Your Bitcoin into a Hard
Lesson
in Cybersecurity
infosecwriteups.com
·
12h
🌳
Merkle Trees
Mastering
Authentication
in MCP: An AI Engineer’s Comprehensive Guide
pub.towardsai.net
·
2d
🔑
Kanidm
Reducing User-Side
Deanonymization
in
Tor
: Usage-Level Safety by Design
dev.to
·
14h
·
Discuss:
DEV
🔒
Digital Privacy
Machine learning reveals hidden
landscape
of
robust
information storage
phys.org
·
15h
🧠
Memory Models
How One Engineer Turned Saudi Cloud
Compliance
from a 6-Month
Bottleneck
into a 2-Week Workflow
hackernoon.com
·
17h
🌳
Merkle Trees
XFS
– Block Atomic Writes in
UEK8
blogs.oracle.com
·
15h
✅
Optimistic Concurrency Control
The Container
paradox
: Why the Inference Cloud Demands a “
Decoupled
” Database
digitalocean.com
·
16h
☸️
Kubernetes
Opus 4.6 Reasoning
Distill
3k
prompts
huggingface.co
·
22h
·
Discuss:
r/LocalLLaMA
📊
Dynamic Programming
Light may
outshine
quantum for some of computing's
toughest
optimization problems
techspot.com
·
12h
⚛️
Quantum Computing
The middle ground between
canonical
models and data
mesh
frederickvanbrabant.com
·
15h
·
Discuss:
r/programming
🏗️
Data Modeling
An introduction to
lockless
algorithms [
LWN.net
]
lwn.net
·
1d
🔓
Lock-Free Programming
Uncloneable
encryption from
decoupling
nature.com
·
4d
🔢
Homomorphic Encryption
Just-in-Time
Ontological
Reframing
: Teaching Gemini to Route Around Its Own Safety Infrastructure
recursion.wtf
·
1d
🔺
Delta Lake
Agree
to
Disagree
in Agent Land
slavozard.bearblog.dev
·
5h
🏗️
Pavex
bitryonix/boomerang
_design: Bitcoin cold-storage with coercion resistance
github.com
·
1d
🔺
Delta Lake
PRoFL-IoV
: A privacy-preserving and robust federated learning framework for short-term load forecasting in the internet of vehicles
sciencedirect.com
·
10h
⏱️
Time Series Analysis
Network function
computation
with
vector
linear target function and security function
arxiv.org
·
1d
🔢
Homomorphic Encryption
Loading...
Loading more...
« Page 1
•
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help