Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🏹 Robin Hood Hashing
Hash Tables, Open Addressing, Variance Reduction, Linear Probing
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74656
posts in
297.1
ms
Adaptive
Hashing
: Faster Hash Functions with Fewer
Collisions
arxiv.org
·
3d
·
Discuss:
Hacker News
#️⃣
Hash Tables
Just-in-Time
Ontological
Reframing
: Teaching Gemini to Route Around Its Own Safety Infrastructure
recursion.wtf
·
6h
🔺
Delta Lake
Signing JSON Web
Tokens
: Algorithm
Tradeoffs
, Performance, and Security
ciamweekly.substack.com
·
11h
·
Discuss:
Substack
🔐
Cryptography
*Quantum‑Resistant Cryptographic Hash Functions Based on the
Colored
Jones Polynomial of
Knots
*
freederia.com
·
4d
⚖️
Consistent Hashing
Main
Content ||
Math
∩ Programming
jeremykun.com
·
1d
📊
Algorithms
Label-Consistent
Backdoor
Attacks
paperium.net
·
1d
·
Discuss:
DEV
🛡️
AI Security
pirafrank/vault-conductor
: An SSH Agent that provides SSH keys stored in
Bitwarden
Secret Manager
github.com
·
2h
·
Discuss:
r/commandline
🔐
WireGuard
Telling the Story of
Chameleon
Hash
Functions: A 27-Year Review
eprint.iacr.org
·
5d
🐦
Cuckoo Hashing
Faster
than
Dijkstra
?
systemsapproach.org
·
19h
🔗
Graph Algorithms
Valuable
News
discoverbsd.com
·
10h
🔍
eBPF
Fibonacci
numbers and time-space
tradeoffs
johndcook.com
·
1d
⚖️
Y-Fast Tries
Podcast: [Video Podcast] Improving
Valkey
with
Madelyn
Olson
infoq.com
·
15h
🔎
Quickwit
Biquandle
Fares and Link
Invariants
arxiv.org
·
21h
🔀
Topological Sorting
SecureShellClaw
: A Prompt-Injection-Resistant Alternative Approach to
OpenClaw
jona.ca
·
1d
·
Discuss:
Hacker News
🔀
Crossbeam
Re-Identification
vs
Anonymization
Strength
testingbranch.com
·
2d
·
Discuss:
Hacker News
👆
Fingerprinting
Mojo
Jojo CTF OSINT Serial Killer chain
writeups
medium.com
·
1d
🔓
Binary Exploitation
Mastering
Authentication
in MCP: An AI Engineer’s Comprehensive Guide
pub.towardsai.net
·
20h
🔑
Kanidm
Expectation
and
Copysets
buttondown.com
·
7h
·
Discuss:
Hacker News
🔐
Homomorphic Secret Sharing
Adding Myers Diff To Share Link
Snapshots
In Big Sexy
Poems
bennadel.com
·
14h
📰
Feed Readers
Analysis of
Hashrate-Based
Double Spending
dev.to
·
1d
·
Discuss:
DEV
⚖️
Consistent Hashing
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help