🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Hash Functions

Cryptographic Hashing, SHA Family, Collision Resistance, Digital Forensics

Why No Single Algorithm Solves Deduplication — and What to Do Instead
hackernoon.com·1d
🔍MinHash Variants
Secure Your Keys with Keyand.me
thasso.xyz·7h·
Discuss: Hacker News
🔗Hash Chains
Evolving Tactics of SLOW#TEMPEST: A Deep Dive Into Advanced Malware Techniques
unit42.paloaltonetworks.com·5h
🛡️RISC-V Security
Practical Bitwise Tricks in Everyday Code (Opinioned)
maltsev.space·17h·
Discuss: r/programming
🔢Bitwise Algorithms
Introducing Oxygen Forensic® Detective v.17.3.1
forensicfocus.com·1d
⚖️Digital Evidence
TLS fingerprinting: What it is and how it works
fingerprint.com·16h
🌐NetworkProtocols
A Refreshing SQL Injection Discovery in Z-Push
xbow.com·21h·
Discuss: Hacker News
🔐Cryptographic Archaeology
Making file encryption fast and secure for teams with advanced key management
dropbox.tech·1d
🔐Homomorphic Encryption
Secure Cooperative Gradient Coding: Optimality, Reliability, and Global Privacy
arxiv.org·11h
🤐Secure Multiparty
The Onion Layers of Everything
brajeshwar.com·15h
🔓Hacking
Writing an IR from Scratch and survive to write a post
farena.in·9h·
Discuss: Lobsters
📝Compiler Design
Yubi Whati? (YubiKeys, ECDSA, and X.509)
ram.tianon.xyz·1d
🔐PKI Archaeology
macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App
sentinelone.com·1d
🦠Malware Analysis
Computer Scientists Figure Out How To Prove Lies
quantamagazine.org·2d·
Discuss: Lobsters, Hacker News, Hacker News, Hacker News
🔗Hash Chains
Show HN: ByteWise Search a Privacy, Zero-Traffic, Community-Driven Search Engine
news.ycombinator.com·4h·
Discuss: Hacker News
🔍BitFunnel
Galois field instructions on 2021 CPUs
corsix.org·1d·
Discuss: Hacker News
🔐RISC-V Cryptography
Factoring Cybersecurity Into Finance's Digital Strategy
darkreading.com·1h
🛡Cybersecurity
Encryption and Decryption in Go: A Hands-On Guide
dev.to·2d·
Discuss: DEV
🌊Stream Ciphers
Interactive explainer of wallet seed phrases, entropy, and BIP39
bennet.org·1d·
Discuss: Hacker News
🌳Archive Merkle Trees
Understanding the NCSC’s New API Security Guidance
lab.wallarm.com·1d
📦Container Security
Loading...Loading more...
AboutBlogChangelogRoadmap