Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Ciphers, Hash Functions, PKI
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
7557
posts in
9.4
ms
Cryptography
and
Cryptanalysis
medium.com
·
1d
📡
Information Theory
Three
steps
to post-quantum
cryptography
thoughtworks.com
·
18h
⚛️
Quantum Computing
Advanced Security
Setup
discuss.privacyguides.net
·
18h
🔐
Hardware Security
Please, please, please stop using
passkeys
for
encrypting
user data
blog.timcappalli.me
·
1d
·
Discuss:
Lobsters
,
Hacker News
,
Hacker News
🔐
Hardware Security
[
Python/Sage
]
Extended
Hidden Number Problem
leetarxiv.substack.com
·
1d
·
Discuss:
r/programming
⚡
Quantization
Zero-Knowledge
IOPPs
for Constrained
Interleaved
Codes
eprint.iacr.org
·
2d
⚡
Speculative Decoding
Clarify password hashing
rationale
and algorithm selection by
Angelmendiratta
· Pull Request #1993
github.com
·
1d
⚙️
Algorithms
BEDCrypt
: Privacy-preserving
interval
analytics with homomorphic encryption
arxiv.org
·
2d
🕵️
Privacy
stay-hooked
— unified
webhook
verification for TypeScript (19 providers, zero dependencies)
github.com
·
18h
·
Discuss:
r/node
💻
Programming Languages
A High-Throughput
AES-GCM
Implementation on GPUs for Secure, Policy-Based Access to Massive Astronomical
Catalogs
arxiv.org
·
1d
🖥️
GPU Programming
ESPclock
hackster.io
·
1d
🕹️
Emulation
Coherent
Care
lesswrong.com
·
18h
∀
Mathematical Logic
AI-Native Automation in
5G-Advanced
and
6G
hackernoon.com
·
1d
🔧
Hardware Hacking
Towards Accountability for
Anonymous
Credentials
eprint.iacr.org
·
3d
🕵️
Privacy
Please, please, please stop using
passkeys
for
encrypting
user data
simonwillison.net
·
17h
🕵️
Privacy
Let’s stop
copying
C
eev.ee
·
22h
🔗
Concatenative Languages
Solving
hard
problems
marcg.net
·
1d
🧮
Complexity Theory
Hacker
Newsletter
#784
kill-the-newsletter.com
·
1d
✍️
Prompt Engineering
Build Your Own Key-Value Storage Engine—Week 7
read.thecoder.cafe
·
2d
⚙️
Algorithms
Data
Confidentiality
via Storage
Encryption
on Embedded Linux Devices
sigma-star.at
·
4d
·
Discuss:
Lobsters
,
Hacker News
,
r/programming
🔐
Hardware Security
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help