Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
馃攼 Cryptography
Encryption, Ciphers, Hash Functions, PKI
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
103329
posts in
251.7
ms
Building a Secret with Math: The
Diffie-Hellman
Guide
shibe-bit.github.io
路
2d
馃攲
FPGA
NSA
and
IETF
, part 5
blog.cr.yp.to
路
1d
路
Discuss:
Hacker News
馃
Malware Analysis
Hashing
vs Encoding vs
Encrypting
vs Signing
caseysoftware.com
路
3d
馃敩
Reverse engineering
Ask HN: Any good resources for
basic
cryptography
?
news.ycombinator.com
路
1d
路
Discuss:
Hacker News
馃攲
FPGA
Building a post-quantum
cryptography
tool for data encryption - will you use it? What do you actually want? (
honest
feedback)
quantumsequrity.com
路
1d
路
Discuss:
r/privacy
馃毄
CTF
Quantum
cryptography-Kyber
Algorithm example
dev.to
路
6h
路
Discuss:
DEV
馃敩
Reverse engineering
Threat
Modeling
: The First Step on Your Privacy
Journey
privacyguides.org
路
12h
馃毄
CTF
Show HN:
Tamper-proof
work verification with
Ed25519
and RFC 3161 TSA
yourbeforeafterwork.netlify.app
路
14h
路
Discuss:
Hacker News
馃毄
CTF
Cryptography
Focused
stevedylan.dev
路
3d
馃
Malware Analysis
hertz
and floats and doubles and
integers
subethasoftware.com
路
7h
馃挜
Binary Exploitation
Ghost in the Wire:
Forensic
Analysis of a
lighttpd2
Backdoor
blogs.tunelko.com
路
1d
馃挜
Binary Exploitation
Carelessness
versus
craftsmanship
in cryptography
blog.trailofbits.com
路
2d
路
Discuss:
Lobsters
,
Hacker News
馃挜
Binary Exploitation
[Python]Guessing Bits: Improved Lattice Attacks on(EC)DSA with
Nonce
Leakage
leetarxiv.substack.com
路
2d
路
Discuss:
Substack
,
r/programming
馃挜
Binary Exploitation
How I built a minimal-knowledge
sync
for
WorkLedger
bastiangruber.ca
路
1d
路
Discuss:
Lobsters
,
Hacker News
馃毄
CTF
Solene
'% : Comparison of cloud storage
encryption
software
dataswamp.org
路
2d
路
Discuss:
Hacker News
馃挜
Binary Exploitation
Weak
Zero-Knowledge and One-Way
Functions
arxiv.org
路
1d
馃毄
CTF
Integrity
of a Shared
Filesystem
uncultu.red
路
5h
路
Discuss:
Hacker News
馃挜
Binary Exploitation
Using
encrypted
fields with
mongodb
community
dev.to
路
2d
路
Discuss:
DEV
馃毄
CTF
Systematic
Review of Lightweight
Cryptographic
Algorithms
arxiv.org
路
3d
馃挜
Binary Exploitation
JWT
Security
cheatsheetseries.owasp.org
路
1d
路
Discuss:
DEV
馃毄
CTF
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help