๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Cryptographic Archaeology

Historical Ciphers, Algorithm Evolution, Security Heritage, Cipher Recovery

Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.comยท4d
๐Ÿ”Archive Cryptanalysis
DIAC โˆž 2: A Post-Quantum, P=NP-Resistant Hybrid Encryption System
osf.ioยท11hยท
Discuss: Hacker News
๐Ÿ”Quantum Security
Reversing a (not-so-) Simple Rust Loader | cxiao.net
cxiao.netยท15h
๐Ÿฆ€Rust Macros
FALCON: Autonomous Cyber Threat Intelligence Mining with LLMs for IDS Rule Generation
arxiv.orgยท1h
๐Ÿ”’Language-based security
From punch cards to prompts: a history of how software got better
stackoverflow.blogยท22m
๐Ÿ”„Reproducible Builds
StrongBox: Simple, Safe Data Encryption for Rust
hezmatt.orgยท4h
๐Ÿฆ€Embedded Rust
Mini-Review: The Life and Times of the Cubic-Solving Guy
daveagp.wordpress.comยท1d
๐Ÿ—๏ธPaleocryptography
Data Is the New Diamond: Heists in the Digital Age
unit42.paloaltonetworks.comยท6h
๐ŸŽฏThreat Hunting
Enigma Crypto Transmission on Saturday August 30, 2025 @ 2000 GMT
radiomarine.orgยท23hยท
Discuss: Hacker News
๐Ÿ”Polish Cryptanalysis
Put a ring on it: a lock-free MPMC ring buffer
h4x0r.orgยท14hยท
Discuss: Lobsters, Hacker News, Hacker News, r/programming
โšกHardware Transactional Memory
Show HN: SecretMemoryLocker โ€“ File Encryption Without Static Passwords
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
Chatbots, APIs, and the Hidden Risks Inside Your Application Stack
blog.qualys.comยท13h
๐Ÿ‘๏ธSystem Observability
Looking back at "legacy" HTML practices
nooshu.comยท8hยท
Discuss: Hacker News
๐ŸบFormat Archaeology
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.comยท1d
๐Ÿ”Quantum Security
Explaining Fully Homomorphic Encryption to My Mom
olshansky.medium.comยท1dยท
Discuss: Hacker News
๐Ÿ”Homomorphic Encryption
ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies
research.checkpoint.comยท16h
๐Ÿ’ฃZIP Vulnerabilities
Formal Methods for Stellar DeFi: Verifying Lending Protocol with Certora Sunbeam Prover
blog.positive.comยท16h
โœ…Format Verification
Alpay Algebra: Solving the "Unsolvable" or Just Changing the Rules?
lightcapai.medium.comยท3hยท
Discuss: Hacker News
๐Ÿ‘‘Isabelle
CSPs - Part 1: How to (Almost) Always Win at Minesweeper
dev.toยท12hยท
Discuss: DEV
๐Ÿ”ฒCellular Automata
runZero Hour, ep. 21 recap: highlights from hacker summer camp
runzero.comยท15h
๐Ÿ”eBPF
Loading...Loading more...
AboutBlogChangelogRoadmap