๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Hash Functions

Cryptographic Hashing, SHA Family, Collision Resistance, Digital Forensics

Learning ON Large Datasets Using Bit-String Trees
arxiv.orgยท2h
๐Ÿ—‚๏ธVector Databases
noble-curves: audited and minimal elliptic curve cryptography in JavaScript
github.comยท11hยท
Discuss: Hacker News
๐Ÿ”ฑGalois Cryptography
FLINT: Fast Library for Number Theory
flintlib.orgยท12h
๐ŸงฎAlgebraic Datatypes
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.comยท21h
๐Ÿ”Quantum Security
Show HN: SecretMemoryLocker โ€“ File Encryption Without Static Passwords
news.ycombinator.comยท13hยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
Sets & Heaps in Haskell and Rust
mmhaskell.comยท21h
๐Ÿ”’Type Safety
It takes 26 yottabytes of RAM to typecheck a union of Safe Integers
playfulprogramming.comยท1d
๐ŸงชBinary Fuzzing
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.comยท18h
๐ŸŽฏThreat Hunting
Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.comยท3d
๐Ÿ”Cryptographic Archaeology
Paying attention to feature distribution alignment (pun intended)
alexshtf.github.ioยท21hยท
Discuss: Hacker News
๐Ÿ“Linear Algebra
Go module for brute force attacks on SSH steals the accesses found
heise.deยท20h
๐Ÿ›ฃ๏ธBGP Hijacking
Claude Code's 19 cent Parser
blogger.comยท17h
๐Ÿ”งBinary Parsers
How to spot high-activity devices & stop scaled abuse in its tracks
fingerprint.comยท8h
๐ŸŽฏThreat Hunting
Mini-Review: The Life and Times of the Cubic-Solving Guy
daveagp.wordpress.comยท3h
๐Ÿ—๏ธPaleocryptography
LINUX CREDENTIAL HUNTING
infosecwriteups.comยท1d
๐Ÿ“ŸTerminal Forensics
Song recommendations with F# free monads
blog.ploeh.dkยท23h
๐Ÿ”—Functional Compilers
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.comยท16h
๐Ÿ›กCybersecurity
Show HN: DataCompose โ€“ Prevent downstream data failures with composite functions
datacompose.ioยท10hยท
Discuss: Hacker News
โœ…Format Validation
Explaining Fully Homomorphic Encryption to My Mom
olshansky.medium.comยท2hยท
Discuss: Hacker News
๐Ÿ”Homomorphic Encryption
ZAPS: A Zero-Knowledge Proof Protocol for Secure UAV Authentication with Flight Path Privacy
arxiv.orgยท2h
๐ŸŒณArchive Merkle Trees
Loading...Loading more...
AboutBlogChangelogRoadmap