Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Homomorphic Secret Sharing
Secure Computation, MPC, Privacy, Threshold Cryptography
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
112653
posts in
928.5
ms
Hacking
the
Maclock
taoofmac.com
·
1d
💾
Retro Computing
How to
Secure
Cloud Storage on Linux With
VeraCrypt
linuxinsider.com
·
2d
🛡️
AMD SEV
How to Self-Host
OpenClaw
Securely
on a VPS: A Security-First Guide
dsebastien.net
·
1d
🏠
Self-Hosting
Solved
: I’ve always
wanted
to make something like this. Does anyone know how to
dev.to
·
6h
·
Discuss:
DEV
📝
Write-Ahead Logging
Zero-Trust Data
Warehousing
for Agentic AI: Why
Trusting
the Pipeline No Longer Scales
hackernoon.com
·
1d
🛡️
AI Security
SecretSpec
0.7:
Declarative
Secret Generation
devenv.sh
·
2d
·
Discuss:
Lobsters
,
Hacker News
,
r/NixOS
,
r/programming
💼
Thrift
PAPER: Privacy-Preserving Convolutional Neural Networks using Low-Degree Polynomial Approximations and Structural Optimizations on
Leveled
FHE
arxiv.org
·
1d
🔢
Homomorphic Encryption
Edge‑
Computed
Homomorphic Encryption for Secure Biometric Authentication in Autonomous
Kiosk
Terminals — ### Abstract Secure user authentication is a c...
freederia.com
·
5d
🔢
Homomorphic Encryption
Impossibility
of
CPAD
security for a class of FHE schemes
eprint.iacr.org
·
3d
🔢
Homomorphic Encryption
An introduction to
lockless
algorithms [
LWN.net
]
lwn.net
·
2d
🔓
Lock-Free Programming
gharasathi
(
घर
ासाठी) — A Privacy-First Household AI Running on a $200 Mini PC
amazon.com.au
·
3d
·
Discuss:
DEV
🦙
Ollama
Architectural and Mathematical
Foundations
of Machine Learning: A
Rigorous
Synthesis of Theory, Geometry, and Implementation
chizkidd.github.io
·
5h
·
Discuss:
Hacker News
📊
Optimization
The
Prospero
Challenge
mattkeeter.com
·
2d
🎮
SIMT Execution
Differential‑Privacy‑Enhanced
Homomorphic
Filtering
for Decentralized Social Media: A Practical Framework for Censorship‑Resistance
freederia.com
·
6d
🔢
Homomorphic Encryption
Network function
computation
with
vector
linear target function and security function
arxiv.org
·
1d
🔢
Homomorphic Encryption
eVer: Universal and Automated Verification of Side-Channel Security for
Additive
, Inner Product, Polynomial and General Code-Based
Masking
eprint.iacr.org
·
2d
🎭
SIMD Masking
A
Proof
of P =
NP
dev.to
·
2d
·
Discuss:
DEV
💃
Dancing Links
What
Functional
Programmers
Get Wrong About Systems
iankduncan.com
·
1d
💎
Refinement Types
AI agent
sandboxing
in 2026: how to choose between primitives,
runtimes
, and platforms
manveerc.substack.com
·
43m
·
Discuss:
Substack
🔐
Capability Systems
Secrets management with
SOPS
Guix --
fishinthecalculator
fishinthecalculator.me
·
3d
🛡️
AMD SEV
Loading...
Loading more...
« Page 4
•
Page 6 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help