🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Cryptography

Encryption, Ciphers, Security, Hash Functions, Public Key

CodeQL: code organization, metadata, and running in CI
tweag.io·1d
⚙️Compilers
The Sovereign Engineering Philosophy
sovereignengineering.io·9h
🔢Mathematical Puzzles
18 Applications of Deception Probes
lesswrong.com·7h
🔢Mathematical Puzzles
PCI SSC Releases New Guidance on Authentication and Cryptography
blog.pcisecuritystandards.org·2d
⚙️Compilers
Intelligence Brief: UNC6040 Threat Assessment
cstromblad.com·1d
⚙️Compilers
Structural vs. Mathematical “Under” (2023)
dyalog.com·3d·
Discuss: Lobsters, Hacker News, r/programming
⚙️Compilers
Byte Magazine, USPTO, Amazon, More: Thursday Afternoon ResearchBuzz, August 28, 2025
researchbuzz.me·7h
🔢Mathematical Puzzles
Tic-tac-toe meets Lean 4
ochagavia.nl·1d·
Discuss: Lobsters, Hacker News, r/programming
🧩Puzzles
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.com·3d
🔢Mathematical Puzzles
A Review of Nim 2: The Good and Bad with Example Code
miguel-martin.com·3h·
Discuss: Hacker News
⚙️Compilers
Which is the stronger password? g72$l#pT9a or –.COW
ianmccloy.com·3d·
Discuss: Hacker News
🔢Mathematical Puzzles
Notes on Programming in C by Rob Pike
lysator.liu.se·47m·
Discuss: Hacker News
💻Programming
DApp Development in Action: Writing, Testing, and Deploying a Smart Contract
tantrija.com·2d·
Discuss: DEV
💻Programming
📚 My Python Roadmap Journey #2 - Basics
dev.to·5h·
Discuss: DEV
💻Programming
noble-curves: audited and minimal elliptic curve cryptography in JavaScript
github.com·3d·
Discuss: Hacker News
🔢Mathematical Puzzles
Everyone should know which passwords suck. Do you?
nordot.app·1d
🔢Mathematical Puzzles
My service was played in Enowars 9: Here is how it went
stoffregen.io·17h·
Discuss: Hacker News
💻Programming
Clean Code: 8 Tips to Write Clean Functions 🔥
thetshaped.dev·2d·
Discuss: r/programming
⚙️Compilers
ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies
research.checkpoint.com·2d
⚙️Compilers
Reverse Engineering Malware for Pen Testers
dev.to·18h·
Discuss: DEV
⚙️Compilers
Loading...Loading more...
AboutBlogChangelogRoadmap