๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”— Hash Chains

Merkle Trees, Blockchain Fundamentals, Integrity Verification, Tamper Detection

Design, Implementation, and Analysis of Fair Faucets for Blockchain Ecosystems
arxiv.orgยท1d
๐ŸคDistributed Consensus
Diving deep into Binius M3 arithmetization using Merkle tree inclusion as an example
blog.lambdaclass.comยท1d
๐ŸŒณArchive Merkle Trees
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.comยท5h
๐ŸŽซKerberos Attacks
How to (Almost) solve cybersecurity once and for all
adaptive.liveยท17hยท
Discuss: Hacker News
๐Ÿ”Systems Hardening
Encrypting identifiers in practice
sjoerdlangkemper.nlยท9h
๐ŸŒŠStream Ciphers
Mastering Malware Analysis: A SOC Analystโ€™s Guide to Dynamic Analysis with AnyRun
infosecwriteups.comยท6h
๐Ÿฆ Malware Analysis
Your Token Becomes Worthless: Unveiling Rug Pull Schemes in Crypto Token via Code-and-Transaction Fusion Analysis
arxiv.orgยท1d
๐ŸŒณArchive Merkle Trees
Bitcoin Cardputer Wallet
hackster.ioยท2d
๐ŸŒณArchive Merkle Trees
Confidential Wrapped Ethereum
ethresear.chยท1dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comยท2h
๐Ÿฆ Malware Analysis
DigitalOcean Fundamentals: API
dev.toยท5hยท
Discuss: DEV
๐Ÿ”ŒInterface Evolution
Secure User-friendly Blockchain Modular Wallet Design Using Android & OP-TEE
arxiv.orgยท1d
๐ŸŒณArchive Merkle Trees
Show HN: Cartesian vs. Sparse Merkle Trees โ€“ faster treap-based design in Go
rafaelescrich.medium.comยท5dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.comยท17h
๐Ÿ”—Data Provenance
Maturing your smart contracts beyond private key risk
blog.trailofbits.comยท1d
๐Ÿ”Quantum Security
Program Execution, follow-up
windowsir.blogspot.comยท2hยท
Discuss: www.blogger.com
โšกPerformance Tools
HariSekhon/DevOps-Bash-tools
github.comยท12h
๐ŸšShell Automation
Quantum computing: secure in the long term thanks to QKD
heise.deยท1h
๐Ÿ”Quantum Security
SSL and TLS Deployment Best Practices
github.comยท15hยท
Discuss: Hacker News
๐Ÿ”Certificate Analysis
Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.comยท7h
๐Ÿ“‹Protocol Buffers
Loading...Loading more...
AboutBlogChangelogRoadmap