๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”ฑ Galois Cryptography

Finite Field Arithmetic, Reed-Solomon Extensions, Polynomial Codes, Error Bounds

Improved homomorphic evaluation for hash function based on TFHE (2024)
cybersecurity.springeropen.comยท4hยท
Discuss: Hacker News
๐Ÿ”Homomorphic Encryption
About the Cryptopocalypse
ritter.vgยท12h
๐ŸŒณArchive Merkle Trees
Bulletproof Go: Security Practices That Actually Work ๐Ÿ”
dev.toยท5hยท
Discuss: DEV
๐ŸงชCBOR Fuzzing
Post-quantum TLS in Python
aws.amazon.comยท23h
๐Ÿ”Quantum Security
Quantum Scientists Have Built a New Math of Cryptography
quantamagazine.orgยท6hยท
Discuss: Hacker News
๐Ÿ”Quantum Security
Boolean SHA256 with TFHE-rs (2023)
zama.aiยท5hยท
Discuss: Hacker News
๐Ÿ”ขBitwise Algorithms
Algebra Problems of the Day (Algebra Regents, June 2025 Part II)
mrburkemath.blogspot.comยท4hยท
Discuss: www.blogger.com
๐Ÿ“Linear Algebra
XOR Crack Kit
kobolt.websiteยท20h
๐Ÿ”Cryptographic Archaeology
2025 One Hertz Challenge: A Discrete Component Divider Chain
hackaday.comยท2h
โš™๏ธCassette Mechanics
Analogs of binomial coefficients
johndcook.comยท20h
ฮปLambda Encodings
Reasoning about Rare-Event Reachability in Stochastic Vector Addition Systems via Affine Vector Spaces
arxiv.orgยท1d
๐ŸŽฏPerformance Proofs
FreeBSD Guide to Lock-In Free Infrastructure
discoverbsd.comยท12h
๐Ÿ”ŒOperating system internals
Python implementation of Apple PQ3 protocol
github.comยท21hยท
Discuss: Hacker News
๐Ÿ”Quantum Security
FHE@PDX 2025
jeremykun.comยท3h
๐Ÿ”Homomorphic Encryption
It Takes a Village: Bridging the Gaps between Current and Formal Specifications for Protocols
cacm.acm.orgยท2d
๐ŸŒNetworkProtocols
How To Deploy Fluent Bit in a Kubernetes-Native Way
thenewstack.ioยท43m
๐Ÿ“ฆContainer Security
Scientists Use Cryptography To Unlock Secrets of Quantum Advantage
scitechdaily.comยท23h
๐Ÿ”Quantum Security
Discretizing and quantizing neural nets
danmackinlay.nameยท18h
๐Ÿ“ŠQuantization
Google Forms exploited in crypto-stealing scam - here's what we know
techradar.comยท4h
๐ŸŽซKerberos Attacks
Do not use email for sensitive data
eshlox.netยท2d
๐Ÿ”Homomorphic Encryption
Loading...Loading more...
AboutBlogChangelogRoadmap