🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”² Lattice Cryptography

Post-quantum Security, Ring-LWE, Archive Encryption, Long-term Confidentiality

Preparing for the Quantum Leap: The Urgency of Post-Quantum Cryptography
dev.toΒ·3dΒ·
Discuss: DEV
πŸ”Quantum Security
Quantum computing: secure in the long term thanks to QKD
heise.deΒ·1h
πŸ”Quantum Security
Encrypting identifiers in practice
sjoerdlangkemper.nlΒ·9h
🌊Stream Ciphers
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.orgΒ·1d
πŸ”’Bitwise Algorithms
Post-Quantum Cryptography Implementation Enterprise-Readiness Analysis
darknet.org.ukΒ·13h
πŸ”Quantum Security
A novel approach to password-auth without sharing the password to server
danieltan.weblog.lolΒ·1dΒ·
Discuss: Hacker News
🎯NTLM Attacks
Counting with Categories (Part 3)
golem.ph.utexas.eduΒ·22h
Ξ»Lambda Formalization
More pathways that previously thought can lead to optical topological insulators
phys.orgΒ·18h
🌈Holographic Storage
How keys are used in FileVault and encryption
eclecticlight.coΒ·7hΒ·
Discuss: Lobsters
πŸ’£Compression Security
Are we overthinking post-quantum cryptography?
neilmadden.blogΒ·4dΒ·
Discuss: Hacker News
πŸ”Quantum Security
Iterative Quantum Feature Maps
arxiv.orgΒ·10h
βš›οΈQuantum Circuits
Diving deep into Binius M3 arithmetization using Merkle tree inclusion as an example
blog.lambdaclass.comΒ·1d
🌳Archive Merkle Trees
A (quantum) complex legacy: Part trois
quantumfrontiers.comΒ·2d
βš›οΈQuantum Tape
Maturing your smart contracts beyond private key risk
blog.trailofbits.comΒ·1d
πŸ”Quantum Security
How to (Almost) solve cybersecurity once and for all
adaptive.liveΒ·17hΒ·
Discuss: Hacker News
πŸ”Systems Hardening
4-input 2-output Boolean circuits (2020)
cp4space.hatsya.comΒ·1dΒ·
Discuss: Hacker News
βš™οΈLogic Synthesis
Confidential Wrapped Ethereum
ethresear.chΒ·1dΒ·
Discuss: Hacker News
🌳Archive Merkle Trees
Why β€˜TRUST-NO-ONE’ Is Your Strongest Defense
infosecwriteups.comΒ·6h
🌐Network Security
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.orgΒ·12hΒ·
Discuss: Hacker News
πŸ”Homomorphic Encryption
A Qubit-Efficient Hybrid Quantum Encoding Mechanism for Quantum Machine Learning
arxiv.orgΒ·10h
βš›οΈQuantum Codes
Loading...Loading more...
AboutBlogChangelogRoadmap