🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Homomorphic Encryption

Privacy-preserving Computation, Encrypted Processing, Secure Multiparty, FHE

On One-Shot Signatures, Quantum vs Classical Binding, and Obfuscating Permutations
arxiv.org·6h
🔐Quantum Security
A Wide Reduction Trick (2022)
words.filippo.io·7h·
Discuss: Lobsters, Hacker News
🌳Archive Merkle Trees
Rethinking Distributed Computing for the AI Era
cacm.acm.org·15h
⚡Incremental Computation
WiSec 2025 Spotlight: Security in the Inaudible World
esat.kuleuven.be·21h
📡Bluetooth Archaeology
Zero Knowledge Proofs in DApp Development Essential Insights for Developers
dev.to·1h·
Discuss: DEV
🌳Archive Merkle Trees
Welcoming Aura to Have I Been Pwned's Partner Program
troyhunt.com·13h
🛡Cybersecurity
Secure and Efficient UAV-Based Face Detection via Homomorphic Encryption and Edge Computing
arxiv.org·2d
🔒Privacy Preserving
Blog - Hey Signal! Great Encryption Needs Great Authentication
sequoia-pgp.org·22h
🎯NTLM Attacks
Privacy Is Web3’s “0 To 1” Moment
hackernoon.com·19h
🔒Privacy Preserving
Signed and stealing: uncovering new insights on Odyssey infostealer
jamf.com·20h
🏺Kerberos Archaeology
New research connects quantum computing power to the security of cryptographic systems
phys.org·1d
🔐Quantum Security
Efficient Private Inference Based on Helper-Assisted Malicious Security Dishonest Majority MPC
arxiv.org·2d
🤐Secure Multiparty
MCP: A Practical Security Blueprint for Developers
thenewstack.io·1d
🔓Hacking
Boffins detail new algorithms to losslessly boost AI perf by up to 2.8x
theregister.com·47m
💻Local LLMs
Checking data integrity
eclecticlight.co·1d
✅Checksum Validation
Attackers Abuse AWS Cloud to Target Southeast Asian Governments
darkreading.com·1d
👁️Observatory Systems
Windows Hello for Business – The Face Swap
insinuator.net·1d
🎯NTLM Attacks
Code Execution Through Email: How I Used Claude to Hack Itself
pynt.io·4h·
Discuss: Hacker News
🔓Hacking
Effectively Zero-Knowledge Proofs for NP with No Interaction, No Setup
eccc.weizmann.ac.il·1d·
Discuss: Hacker News
🎯Interactive Provers
Jaya Klara Brekke: ‘Know who runs your infrastructure’
blog.okfn.org·14h
🌐Network Security
Loading...Loading more...
AboutBlogChangelogRoadmap