How to Securely Store Passwords in a Database
blog.algomaster.ioยท14h
๐Ÿ”“Password Cracking
Flag this post
Modern Perfect Hashing
blog.sesse.netยท1dยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Flag this post
Key Emerging Cybersecurity Threats and Challenges for 2025 and Beyond
rapid7.comยท5h
๐ŸŽฏThreat Hunting
Flag this post
From 70K to 2K Tokens: Optimizing SQL Generation with RAG Architecture
dev.toยท6hยท
Discuss: DEV
๐Ÿฆ€Rust Borrowing
Flag this post
Paillier Cryptosystem
en.wikipedia.orgยท1dยท
Discuss: Hacker News
๐Ÿ”Homomorphic Encryption
Flag this post
Graphing the Ransomware Payment Ecosystem Using STIX Objects
dogesec.comยท1dยท
Discuss: Hacker News
๐Ÿ”—Hash Chains
Flag this post
ACM CCS 2025 Spotlight: How Bad Was The Falcon Bug of 2019?
esat.kuleuven.beยท10h
๐Ÿ”Cryptographic Archaeology
Flag this post
Some Notes from RIPE-91
potaroo.netยท7h
๐ŸŒDNS over QUIC
Flag this post
Re: A few comments on โ€˜ageโ€™ (2019)
groups.google.comยท1dยท
Discuss: Lobsters
๐Ÿ”Archive Encryption
Flag this post
Why and how Bitcoin uses Merkle trees
johndcook.comยท4h
๐ŸŒณArchive Merkle Trees
Flag this post
Hyperloglog: Counting Without Counting
karthihegde.devยท5hยท
Discuss: Hacker News
๐Ÿ“ŠHyperLogLog
Flag this post
The art and science of effective security storytelling
redcanary.comยท1d
๐Ÿ”—Data Provenance
Flag this post
SecureLearn - An Attack-agnostic Defense for Multiclass Machine Learning Against Data Poisoning Attacks
arxiv.orgยท14h
๐Ÿ”Vector Forensics
Flag this post
NetAnalysisยฎ v4.1 โ€“ Decrypting Firefox v144
digital-detective.netยท6h
๐ŸŒWARC Forensics
Flag this post
More on โˆšฯ€
alexkritchevsky.comยท18h
๐Ÿ“Mathematical Art
Flag this post
Complex networks-based anomaly detection for financial transactions in anti-money laundering
sciencedirect.comยท5h
๐Ÿ”Vector Forensics
Flag this post
Schema-Validated, Rules-Guided, and Policy-Driven Experiences
apievangelist.comยท9h
๐Ÿ“‹Format Specification
Flag this post
[$] Fil-C: A memory-safe C implementation
lwn.netยท1h
๐Ÿฆ€Rust Borrowing
Flag this post
Preparing DNSSEC for the Post-Quantum Era
circleid.comยท16m
๐ŸŒDNS Security
Flag this post
Signature schemes you've never heard about โ€“ Kobi Gurkan
kobi.leaflet.pubยท9hยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Flag this post