🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Hash Functions

Cryptographic Hashing, SHA Family, Collision Resistance, Digital Forensics

Why No Single Algorithm Solves Deduplication — and What to Do Instead
hackernoon.com·1d
🔍MinHash Variants
Secure Your Keys with Keyand.me
thasso.xyz·9h·
Discuss: Hacker News
🔗Hash Chains
Evolving Tactics of SLOW#TEMPEST: A Deep Dive Into Advanced Malware Techniques
unit42.paloaltonetworks.com·7h
🛡️RISC-V Security
Practical Bitwise Tricks in Everyday Code (Opinioned)
maltsev.space·18h·
Discuss: r/programming
🔢Bitwise Algorithms
Introducing Oxygen Forensic® Detective v.17.3.1
forensicfocus.com·1d
⚖️Digital Evidence
This Week in Security: Bitchat, CitrixBleed Part 2, Opossum, and TSAs
hackaday.com·3h
🔓Hacking
A Refreshing SQL Injection Discovery in Z-Push
xbow.com·23h·
Discuss: Hacker News
🔐Cryptographic Archaeology
Making file encryption fast and secure for teams with advanced key management
dropbox.tech·1d
🔐Homomorphic Encryption
Secure Cooperative Gradient Coding: Optimality, Reliability, and Global Privacy
arxiv.org·13h
🤐Secure Multiparty
Writing an IR from Scratch and survive to write a post
farena.in·11h·
Discuss: Lobsters
📝Compiler Design
Yubi Whati? (YubiKeys, ECDSA, and X.509)
ram.tianon.xyz·1d
🔐PKI Archaeology
macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App
sentinelone.com·1d
🦠Malware Analysis
TLS fingerprinting: What it is and how it works
fingerprint.com·17h
🌐NetworkProtocols
The Onion Layers of Everything
brajeshwar.com·17h
🔓Hacking
Computer Scientists Figure Out How To Prove Lies
quantamagazine.org·2d·
Discuss: Lobsters, Hacker News, Hacker News, Hacker News
🔗Hash Chains
Show HN: ByteWise Search a Privacy, Zero-Traffic, Community-Driven Search Engine
news.ycombinator.com·6h·
Discuss: Hacker News
🔍BitFunnel
Galois field instructions on 2021 CPUs
corsix.org·1d·
Discuss: Hacker News
🔐RISC-V Cryptography
Factoring Cybersecurity Into Finance's Digital Strategy
darkreading.com·3h
🛡Cybersecurity
Encryption and Decryption in Go: A Hands-On Guide
dev.to·2d·
Discuss: DEV
🌊Stream Ciphers
Interactive explainer of wallet seed phrases, entropy, and BIP39
bennet.org·1d·
Discuss: Hacker News
🌳Archive Merkle Trees
Loading...Loading more...
AboutBlogChangelogRoadmap