🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🤝 Consensus Algorithms

Byzantine Fault Tolerance, Distributed Agreement, Blockchain Fundamentals, Network Reliability

Implementation and Evaluation of Fast Raft for Hierarchical Consensus
arxiv.org·1d
🤝Consensus Protocols
Slashing CI Costs at Uber
uber.com·12h·
Discuss: Hacker News
🔄Reproducible Builds
Design, Implementation, and Analysis of Fair Faucets for Blockchain Ecosystems
arxiv.org·1d
🤝Distributed Consensus
Exploring High Efficiency Web Analysis Results(1750876031390300)
dev.to·3h·
Discuss: DEV
🌊Stream Processing
North Korea - Cyber Threat Actor Profile
cstromblad.com·3h
🇸🇪Nordic Cryptography
How to Quantify Risk and Communicate Effectively: Step 4 to TruRisk™
blog.qualys.com·7h
🎯Threat Hunting
Resilience assessment framework for cyber-physical distribution power system based on coordinated cyber-physical attacks under dynamic game
arxiv.org·18h
🤝Distributed Consensus
Privacy-Preserving Resilient Vector Consensus
arxiv.org·1d
🤝Paxos Consensus
Diving deep into Binius M3 arithmetization using Merkle tree inclusion as an example
blog.lambdaclass.com·2d
🌳Archive Merkle Trees
Networks aren’t fragile because of change, they’re fragile because they change without structure
techradar.com·7h
🤖Network Automation
Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.com·15h
📋Protocol Buffers
Why Agentic Flows Need Distributed-Systems Discipline
temporal.io·1d·
Discuss: Hacker News
⚙️TLA+
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.org·1d
🔢Bitwise Algorithms
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·12h
🎫Kerberos Attacks
Signal Use and Emergent Cooperation
arxiv.org·18h
🔲Cellular Automata
Agentic AI: Implementing Long-Term Memory
towardsdatascience.com·1d
💾Persistence Strategies
A Comparative Analysis of Distributed Linear Solvers under Data Heterogeneity
arxiv.org·1d
⚡Parallel Computing
Navigating the Blockchain Trilemma: Decentralization, Scalability, and Security
dev.to·5d·
Discuss: DEV
🤝Distributed Consensus
How to (Almost) solve cybersecurity once and for all
adaptive.live·1d·
Discuss: Hacker News
🔐Systems Hardening
List-Decodable Byzantine Robust PIR: Lower Communication Complexity, Higher Byzantine Tolerance, Smaller List Size
arxiv.org·1d
🛡️Byzantine Fault Tolerance
Loading...Loading more...
AboutBlogChangelogRoadmap