๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Hash Functions

Cryptographic Hashing, SHA Family, Collision Resistance, Digital Forensics

noble-curves: audited and minimal elliptic curve cryptography in JavaScript
github.comยท5hยท
Discuss: Hacker News
๐Ÿ”ฑGalois Cryptography
FLINT: Fast Library for Number Theory
flintlib.orgยท6h
๐ŸงฎAlgebraic Datatypes
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.comยท15h
๐Ÿ”Quantum Security
Exhaustive Generation of Pattern-Avoiding s-Words
arxiv.orgยท20h
๐Ÿ’พBinary Linguistics
Show HN: SecretMemoryLocker โ€“ File Encryption Without Static Passwords
news.ycombinator.comยท7hยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
Sets & Heaps in Haskell and Rust
mmhaskell.comยท15h
๐Ÿ”’Type Safety
It takes 26 yottabytes of RAM to typecheck a union of Safe Integers
playfulprogramming.comยท1d
๐ŸงชBinary Fuzzing
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.comยท12h
๐ŸŽฏThreat Hunting
Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.comยท3d
๐Ÿ”Cryptographic Archaeology
Paying attention to feature distribution alignment (pun intended)
alexshtf.github.ioยท15hยท
Discuss: Hacker News
๐Ÿ“Linear Algebra
Go module for brute force attacks on SSH steals the accesses found
heise.deยท14h
๐Ÿ›ฃ๏ธBGP Hijacking
Claude Code's 19 cent Parser
blogger.comยท11h
๐Ÿ”งBinary Parsers
How to spot high-activity devices & stop scaled abuse in its tracks
fingerprint.comยท2h
๐ŸŽฏThreat Hunting
LINUX CREDENTIAL HUNTING
infosecwriteups.comยท18h
๐Ÿ“ŸTerminal Forensics
Song recommendations with F# free monads
blog.ploeh.dkยท17h
๐Ÿ”—Functional Compilers
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.comยท10h
๐Ÿ›กCybersecurity
Data Science Path: Automatic Subclass Registration & Python Encryption Algorithms with LabEx
dev.toยท3dยท
Discuss: DEV
๐Ÿ”Cryptographic Archaeology
Show HN: DataCompose โ€“ Prevent downstream data failures with composite functions
datacompose.ioยท4hยท
Discuss: Hacker News
โœ…Format Validation
Trust Spanning Protocol (TSP) Specification
trustoverip.github.ioยท9hยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Is math discovered or invented?
mathwithbaddrawings.comยท13h
๐Ÿ“Mathematical Art
Loading...Loading more...
AboutBlogChangelogRoadmap