๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”ฑ Galois Cryptography

Finite Field Arithmetic, Reed-Solomon Extensions, Polynomial Codes, Error Bounds

noble-curves: audited and minimal elliptic curve cryptography in JavaScript
github.comยท4hยท
Discuss: Hacker News
๐Ÿ”งReed-Solomon
FLINT: Fast Library for Number Theory
flintlib.orgยท4h
๐ŸงฎAlgebraic Datatypes
Claude Code's 19 cent Parser
blogger.comยท10h
๐Ÿ”งBinary Parsers
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.comยท14h
๐Ÿ”Quantum Security
Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.comยท3d
๐Ÿ”Cryptographic Archaeology
Show HN: SecretMemoryLocker โ€“ File Encryption Without Static Passwords
news.ycombinator.comยท6hยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
Exhaustive Generation of Pattern-Avoiding s-Words
arxiv.orgยท19h
๐Ÿ’พBinary Linguistics
Knowledge and Common Knowledge in a Distributed Environment, Part 2
emptysqua.reยท12h
๐ŸคPaxos Consensus
CRYSTALS - The Gently Introduction
dev.toยท4dยท
Discuss: DEV
โš—๏ธAlgebraic Coding
Abhinav Sarkar: A Fast Bytecode VM for Arithmetic: The Compiler
abhinavsarkar.netยท1d
๐Ÿ”—Functional Compilers
Go module for brute force attacks on SSH steals the accesses found
heise.deยท12h
๐Ÿ›ฃ๏ธBGP Hijacking
How Many Paths of Length K Are There Between a and B?
horace.ioยท1dยท
Discuss: Hacker News
๐Ÿ•ธ๏ธGraph Algorithms
Which is the stronger password? g72$l#pT9a or โ€“.COW
ianmccloy.comยท11hยท
Discuss: Hacker News
๐Ÿ”“Password Cracking
Trust Spanning Protocol (TSP) Specification
trustoverip.github.ioยท8hยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Fast-Spreading, Complex Phishing Campaign Installs RATs
darkreading.comยท7h
๐Ÿ”“Hacking
Certificate Transparency - Part 3 - Operations
ipng.chยท1d
๐Ÿ”’Hardware Attestation
It takes 26 yottabytes of RAM to typecheck a union of Safe Integers
playfulprogramming.comยท23h
๐ŸงชBinary Fuzzing
Paying attention to feature distribution alignment (pun intended)
alexshtf.github.ioยท14hยท
Discuss: Hacker News
๐Ÿ“Linear Algebra
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.comยท10h
๐ŸŽฏThreat Hunting
Stable, Mutable References for Ante
antelang.orgยท9hยท
Discuss: Hacker News, r/programming
๐Ÿ”’Type Safety
Loading...Loading more...
AboutBlogChangelogRoadmap