🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔱 Galois Cryptography

Finite Field Arithmetic, Reed-Solomon Extensions, Polynomial Codes, Error Bounds

Quantum-safe security: Progress towards next-generation cryptography
microsoft.com·3d
🔐Quantum Security
The "impossibly small" Microdot web framework
lwn.net·18h·
Discuss: Hacker News
🌐Web Standards
Quantum Internet Breakthrough: Scientists Build Scalable Network Node With Light and Ions
scitechdaily.com·14h
⚛️Quantum Tape
Busy Beaver Hunters Reach Numbers That Overwhelm Ordinary Math
quantamagazine.org·1d·
Discuss: Hacker News, Hacker News
🎞️Tape Combinatorics
LLMs and the Russellian Inversion
philosophicalhacker.com·1h·
Discuss: Hacker News
💻Programming languages
An amusing blind spot in Go's static analysis
gaultier.github.io·1d·
Discuss: Hacker News, r/golang
🧪Binary Fuzzing
LLMs are NOT Turing Complete (at train time), we need "train time recurrence"
fchaubard.github.io·1d·
Discuss: Hacker News
📼Tape Combinators
SecureBitChat v4.01.412 Release
github.com·2d·
Discuss: Hacker News
🌐NetworkProtocols
Qimem: Open-Source Rust Crypto Toolkit. Help Us Build It
github.com·17h·
Discuss: Hacker News
🦀Rust Macros
ImageIO, the Infamous iOS Zero Click Attack Vector (2024)
r00tkitsmm.github.io·1d·
Discuss: Hacker News
🧪Binary Fuzzing
AI Agents Authentication: How to secure agentic Logins
dev.to·2d·
Discuss: DEV
🔐PAKE Protocols
Show HN: Ultra-fast, embedded KV store in pure Rust
github.com·1d·
Discuss: Hacker News
🦀Rusty Databases
I’m creating an open-source application to manage deployment strategies for applications.
reddit.com·4h·
Discuss: r/kubernetes
🔓Open Source Software
Semcheck: Spec-Driven Development Using LLMs
labs.rejot.dev·1d·
Discuss: Hacker News
⚡Proof Automation
The Cost of Winning:How RL Training on Poker Leads to Evil LLMs
tobysimonds.com·1d·
Discuss: Hacker News
🔲Cellular Automata
Rebuilding Babel: The Tokenizer (2022)
nan.fyi·1d·
Discuss: Hacker News
🔗Concatenative Programming
Can AI weaponize new CVEs in under 15 minutes?
valmarelox.substack.com·2d·
Discuss: Substack
🧪Protocol Fuzzing
Show HN: Implement BLAKE3 with Awk
github.com·1d·
Discuss: Hacker News
🔐Hash Functions
A Constant-Time Hardware Architecture for the CSIDH Key-Exchange Protocol
arxiv.org·6d
🌊Stream Ciphers
Weaponizing image scaling against production AI systems
blog.trailofbits.com·2d·
Discuss: Hacker News, r/LocalLLaMA, r/programming
🕵️Vector Smuggling
Loading...Loading more...
AboutBlogChangelogRoadmap