Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Homomorphic Secret Sharing
Secure Computation, MPC, Privacy, Threshold Cryptography
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
110877
posts in
1.67
s
CloudFront
Adds Origin
mTLS
Authentication for End-to-End Zero Trust
infoq.com
·
1d
🐝
Cilium
Predictive free energy simulations through hierarchical
distillation
of quantum
Hamiltonians
pnas.org
·
1d
⚛️
Quantum Computing
[
AINews
] Qwen Image 2 and
Seedance
2
latent.space
·
1d
🌀
Naiad
N-Grams
and Other
Experiments
dotterrer.bearblog.dev
·
1d
🔄
Burrows-Wheeler Transform
laphilosophia/strime
: Streaming projection engine — extract fields at multi-gigabit speeds with O(1) memory
github.com
·
1d
·
Discuss:
r/node
🌊
Memory Bandwidth
The
Secure
Force: Building an End-to-End
SDLC
Without Breaking the Bank
hackernoon.com
·
1d
🧪
Jepsen Testing
*Journal of Data Governance and AI Integration, Vol. 12, 2026* — ### Abstract Global advertising platforms
aggregate
sensitive
user data from millions ...
freederia.com
·
6d
🔢
Homomorphic Encryption
How Secret Loyalty
Differs
from Standard
Backdoor
Threats
lesswrong.com
·
1h
🛡️
AI Security
The Price of Privacy For
Approximating
Max-CSP
arxiv.org
·
1d
🔺
CAP Theorem
Kiro
: DeepSeek,
MiniMax
, and Qwen now available as open weight model options
kiro.dev
·
1d
·
Discuss:
Hacker News
🦙
Ollama
Main
Content ||
Math
∩ Programming
jeremykun.com
·
3d
📊
Algorithms
PRoFL-IoV
: A privacy-preserving and robust federated learning framework for short-term load forecasting in the internet of vehicles
sciencedirect.com
·
1d
⏱️
Time Series Analysis
Uncloneable
encryption from
decoupling
nature.com
·
6d
🔢
Homomorphic Encryption
The “Node 1.9”
Miracle
: How to Turn Your Bitcoin into a Hard
Lesson
in Cybersecurity
infosecwriteups.com
·
2d
🌳
Merkle Trees
Federated
Learning Under Fire: Why Your Data Still
Leaks
smarterarticles.co.uk
·
3d
🔒
Differential Privacy
Zvec
: SQLite-like
simplicity
in an embedded vector database (By Alibaba)
zvec.org
·
7h
·
Discuss:
Hacker News
🧮
Vector Databases
Usage of Mixed Integer Linear Programming in
Cryptanalysis
of Block
Ciphers
eprint.iacr.org
·
1d
🧩
Constraint Programming
Auto-unlocking a
LUKS-encrypted
root volume with
Clevis
and a TPM (Debian/Ubuntu)
rainygarden.net
·
13h
🔐
Hardware Security
Show HN:
Quoracle
, a recursive consensus-based multi-agent
orchestrator
(Elixir)
github.com
·
4h
·
Discuss:
Hacker News
🦓
Zookeeper
— ### Abstract Public and private stakeholders now need mechanisms that allow joint genome‑wide association studies (
GWAS
) without disclosing raw
genot
...
freederia.com
·
6d
🔢
Homomorphic Encryption
Loading...
Loading more...
« Page 3
•
Page 5 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help