🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Cryptographic Archaeology

Historical Ciphers, Algorithm Evolution, Security Heritage, Cipher Recovery

Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.comΒ·4d
πŸ”Archive Cryptanalysis
DIAC ∞ 2: A Post-Quantum, P=NP-Resistant Hybrid Encryption System
osf.ioΒ·1hΒ·
Discuss: Hacker News
πŸ”Quantum Security
Reversing a (not-so-) Simple Rust Loader | cxiao.net
cxiao.netΒ·5h
πŸ¦€Rust Macros
Learning ON Large Datasets Using Bit-String Trees
arxiv.orgΒ·15h
πŸ—‚οΈVector Databases
Mini-Review: The Life and Times of the Cubic-Solving Guy
daveagp.wordpress.comΒ·16h
πŸ—οΈPaleocryptography
Enigma Crypto Transmission on Saturday August 30, 2025 @ 2000 GMT
radiomarine.orgΒ·13hΒ·
Discuss: Hacker News
πŸ”Polish Cryptanalysis
Put a ring on it: a lock-free MPMC ring buffer
h4x0r.orgΒ·4hΒ·
Discuss: Lobsters, Hacker News, r/programming
⚑Hardware Transactional Memory
Show HN: SecretMemoryLocker – File Encryption Without Static Passwords
github.comΒ·1dΒ·
Discuss: Hacker News
πŸ”Archive Encryption
Chatbots, APIs, and the Hidden Risks Inside Your Application Stack
blog.qualys.comΒ·3h
πŸ‘οΈSystem Observability
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.comΒ·1d
πŸ”Quantum Security
Explaining Fully Homomorphic Encryption to My Mom
olshansky.medium.comΒ·15hΒ·
Discuss: Hacker News
πŸ”Homomorphic Encryption
ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies
research.checkpoint.comΒ·6h
πŸ’£ZIP Vulnerabilities
Formal Methods for Stellar DeFi: Verifying Lending Protocol with Certora Sunbeam Prover
blog.positive.comΒ·7h
βœ…Format Verification
Techno Security & Digital Forensics Conference Returns To San Diego With Deep Dive Into AI, Cybercrime, And Justice
forensicfocus.comΒ·8h
🚨Incident Response
Knowledge and Common Knowledge in a Distributed Environment, Part 2
emptysqua.reΒ·1d
🀝Paxos Consensus
HOW TO HIRE A HACKER TO RECOVER LOST OR STOLEN BITCOIN : GRAVOY TECH NETWORK
dev.toΒ·7hΒ·
Discuss: DEV
πŸ”—Hash Chains
CSPs - Part 1: How to (Almost) Always Win at Minesweeper
dev.toΒ·2hΒ·
Discuss: DEV
πŸ”²Cellular Automata
runZero Hour, ep. 21 recap: highlights from hacker summer camp
runzero.comΒ·5h
πŸ”eBPF
CERN’s Large Hadron Collider Runs on A Bendix G-15 in 2025
hackaday.comΒ·1d
πŸ‡¬πŸ‡§British Computing
Win-DDoS Under the Microscope: Lab Insights into Potential Threat Behavior
corero.comΒ·4h
πŸ•΅οΈDomain Enumeration
Loading...Loading more...
AboutBlogChangelogRoadmap