Feeds to Scour
SubscribedAll
Scoured 13737 posts in 384.5 ms
Nonlocality of quantum states can be transitive
nature.comยท21h
โš›๏ธQuantum Channels
Preview
Report Post
Password Hashing Competition
password-hashing.netยท23mยท
Discuss: Hacker News
๐Ÿ”“Password Cracking
Preview
Report Post
Security Parameter Analysis of the LINEture Post-Quantum Digital Signature Scheme
arxiv.orgยท3d
๐Ÿ”Quantum Security
Preview
Report Post
Vulnerabilities in the Cashu ECash Protocol
conduition.ioยท1d
๐Ÿ”—Hash Chains
Preview
Report Post
Building Cryptographic Audit Trails for AI Trading Systems: A Deep Dive into RFC 6962-Based Verification
dev.toยท4hยท
Discuss: DEV
๐ŸŒณArchive Merkle Trees
Preview
Report Post
Leveraging biased noise for more efficient quantum error correction at the circuit level with two-level qubits
link.aps.orgยท1d
โš›๏ธQuantum Error Correction
Preview
Report Post
Using Keybase and PGP to Build Certificate Trust Chains
blog.certisfy.comยท1dยท
Discuss: Hacker News
๐Ÿ”Certificate Analysis
Preview
Report Post
Solving quantum computing's longstanding 'no cloning' problem with an encryption workaround
phys.orgยท5d
๐Ÿ”Quantum Security
Preview
Report Post
Axiom Prover: From Seeing Why to Checking Everything (AxiomProver Solves All Problems at Putnam 2025: Proof Release & Commentary)
axiommath.aiยท48m
๐ŸงฎTheorem Proving
Preview
Report Post
Continuous Rotating 4096-Bit Post-Quantum Encryption โ€“ Data Useless If Stolen
news.ycombinator.comยท4dยท
Discuss: Hacker News
๐Ÿ”Quantum Security
Preview
Report Post
Sweet32: Birthday attacks on 64-bit block ciphers in TLS and OpenVPN
sweet32.infoยท2d
๐ŸŒŠStream Ciphers
Preview
Report Post
Bi-twin prime chains
johndcook.comยท1dยท
Discuss: Hacker News
๐Ÿ”—Hash Chains
Preview
Report Post
A Practical Guide to Build Secure MCP Servers
go.mcptotal.ioยท8hยท
Discuss: Hacker News
๐ŸŒDNS Security
Preview
Report Post
Some quantum computers might need more power than supercomputers
newscientist.comยท2d
โš›๏ธQuantum Tape
Preview
Report Post
Sub Rosa โ€“ An open-source, end-to-end secret sharing tool
sub-rosa.devยท1dยท
Discuss: Hacker News
๐Ÿ”Swedish Cryptography
Preview
Report Post
The Ubiquity Tradeoff
cacm.acm.orgยท1d
๐Ÿ•ธ๏ธMesh Networking
Preview
Report Post
Linear algebra over field extensions
guille.siteยท1d
๐Ÿ“Linear Algebra
Preview
Report Post
Inside the sub-zero lair of the world's most powerful quantum computer
bbc.comยท3d
โš›๏ธQuantum Tape
Preview
Report Post
Non-Traditional Profiling
mgaudet.caยท2hยท
Discuss: Hacker News
๐Ÿ”—Binary Similarity
Preview
Report Post
Choosing a GGUF Model: K-Quants, I-Quants, and Legacy Formats
kaitchup.substack.com
ยท1dยท
๐Ÿ’ปLocal LLMs
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help