🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Hash Functions

Cryptographic Hashing, SHA Family, Collision Resistance, Digital Forensics

PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.be·1d
⚗️Algebraic Coding
Stop Exposing Your Data: How to Pack IDs, UUIDs, and More with Obfusbit
dev.to·20h·
Discuss: DEV
💣Compression Security
Efficient Byzantine Consensus MechanismBased on Reputation in IoT Blockchain
arxiv.org·11h
🤝Consensus Algorithms
Making of SARE: Master Seeds in Hybrid Post-Quantum Encryption
zola.ink·4h·
Discuss: Hacker News
🌳Archive Merkle Trees
The hiring test that defeated AI
bitecode.dev·11m
✅Shell Verification
Why the Old Ways Are Still the Best for Most Cybercriminals
darkreading.com·1h
🎯Threat Hunting
Deepfake Forensics Is Much More Than Deepfake Detection!
blog.ampedsoftware.com·2h
💿DAT Forensics
Digital Fraud in the Jewellery Business — How Hackers Are Misusing Trusted Jewellery Brands?
infosecwriteups.com·6h
🚨Incident Response
Schizophrenic Zip Files
blog.isec.pl·4h·
Discuss: Hacker News
💣ZIP Vulnerabilities
Indexing Blockchain Events with Rust and Alloy
blog.bilinearlabs.io·17h·
Discuss: Hacker News
🔗Hash Chains
The Coming Wave: Post-Quantum Cryptography and the Future of Cybersecurity
blog.publiccomps.com·13h·
Discuss: Hacker News
🔐Quantum Security
Where Matters: Location Feature Engineering for Search & Recs
shaped.ai·1d
📏Range Queries
SAT Requires Exhaustive Search
link.springer.com·19h·
Discuss: Hacker News
🧮Kolmogorov Complexity
We trained LLM to find reentrancy vulnerabilities in smart contracts
blog.unvariant.io·52m·
Discuss: Hacker News
🧪Binary Fuzzing
Experimental Evaluation of Post-Quantum Homomorphic Encryption for Privacy-Preserving V2X Communication
arxiv.org·11h
🔐Homomorphic Encryption
Simple Methods Defend RAG Systems Well Against Real-World Attacks
arxiv.org·11h
🔐Systems Hardening
Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being
forensicfocus.com·1h
🚨Incident Response
Calcule
calcule.app·2h·
Discuss: Hacker News
🔤Unicode Normalization
SIEVE — a better algorithm than LRU?
blog.apnic.net·10h
💨Cache Analysis
Solving Pell Equations with Index Calculus
leetarxiv.substack.com·1d·
Discuss: Substack, r/programming
🎯Proof Tactics
Loading...Loading more...
AboutBlogChangelogRoadmap