Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Homomorphic Secret Sharing
Secure Computation, MPC, Privacy, Threshold Cryptography
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
112428
posts in
2.07
s
How to
Secure
Cloud Storage on Linux With
VeraCrypt
linuxinsider.com
·
1d
🛡️
AMD SEV
An introduction to
lockless
algorithms [
LWN.net
]
lwn.net
·
2d
🔓
Lock-Free Programming
How to Self-Host
OpenClaw
Securely
on a VPS: A Security-First Guide
dsebastien.net
·
1d
🏠
Self-Hosting
Hacking
the
Maclock
taoofmac.com
·
1d
💾
Retro Computing
AI giants are
racing
to secure
shrinking
memory. It’s creating opportunities for startups
sifted.eu
·
2d
🧩
mimalloc
Network function
computation
with
vector
linear target function and security function
arxiv.org
·
1d
🔢
Homomorphic Encryption
SecretSpec
0.7:
Declarative
Secret Generation
devenv.sh
·
2d
·
Discuss:
Lobsters
,
Hacker News
,
r/NixOS
,
r/programming
💼
Thrift
On Meta-Level Adversarial
Evaluations
of (White-Box) Alignment
Auditing
lesswrong.com
·
22h
🛡️
AI Security
— ### Abstract Public and private stakeholders now need mechanisms that allow joint genome‑wide association studies (
GWAS
) without disclosing raw
genot
...
freederia.com
·
5d
🔢
Homomorphic Encryption
On Lifting
AGM
Security to
AGM
with
Oblivious
Sampling
eprint.iacr.org
·
3d
🔢
Homomorphic Encryption
Universal
Turing
Machine
universalturingmachine.org
·
1d
🚦
Wait-Free Algorithms
Discord
Wants Your ID! | This Week in Privacy #40 (
Feb
13, 2026)
discuss.privacyguides.net
·
15h
🔒
Digital Privacy
Information Flow Verification Framework
Integrating
Static and
Formal
Verification Methods At The Pre-Silicon Stage (U. of Florida)
semiengineering.com
·
21h
✓
Formal Verification
Architectural and Mathematical
Foundations
of Machine Learning: A
Rigorous
Synthesis of Theory, Geometry, and Implementation
chizkidd.github.io
·
1h
·
Discuss:
Hacker News
📊
Optimization
Reducing User-Side
Deanonymization
in
Tor
: Usage-Level Safety by Design
dev.to
·
23h
·
Discuss:
DEV
🔒
Digital Privacy
Entropic
Balance with Feedback Control: Information
Equalities
and Tight Inequalities
link.aps.org
·
1d
🎯
Reinforcement Learning
Accelerating
Post-Quantum
Cryptography
via LLM-Driven Hardware-Software Co-Design
arxiv.org
·
10h
🔧
LLVM IR Optimization
Zero-Trust Data
Warehousing
for Agentic AI: Why
Trusting
the Pipeline No Longer Scales
hackernoon.com
·
1d
🛡️
AI Security
Edge‑
Computed
Homomorphic Encryption for Secure Biometric Authentication in Autonomous
Kiosk
Terminals — ### Abstract Secure user authentication is a c...
freederia.com
·
5d
🔢
Homomorphic Encryption
Impossibility
of
CPAD
security for a class of FHE schemes
eprint.iacr.org
·
2d
🔢
Homomorphic Encryption
Loading...
Loading more...
« Page 3
•
Page 5 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help