🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔲 Lattice Cryptography

Post-quantum Security, Ring-LWE, Archive Encryption, Long-term Confidentiality

The Coming Wave: Post-Quantum Cryptography and the Future of Cybersecurity
blog.publiccomps.com·1d·
Discuss: Hacker News
🔐Quantum Security
BDFirewall: Towards Effective and Expeditiously Black-Box Backdoor Defense in MLaaS
arxiv.org·12h
🛡️eBPF Security
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.be·2d
⚗️Algebraic Coding
Looking back at Martin Gardner’s RSA article
johndcook.com·1d
🔐Quantum Security
Making of SARE: Master Seeds in Hybrid Post-Quantum Encryption
zola.ink·1d·
Discuss: Hacker News
🌳Archive Merkle Trees
Discarded particles dubbed 'neglectons' may unlock universal quantum computing
phys.org·1d
⚛️Information Physics
Analysing Snapshot Isolation
muratbuffalo.blogspot.com·1d·
Discuss: www.blogger.com
🌳Persistent Data Structures
Using Closures to Extend Class Behavior Without Breaking Encapsulation
hackernoon.com·21h
🔬Refinement Types
This Quantum Entanglement Trick Has Physicists Losing Their Minds
popularmechanics.com·2d
⚛️Quantum Channels
The Future of Quantum Key Distribution and Global Secure Communications
luciuswayne.com·2d·
Discuss: Hacker News
🔐Quantum Security
A New Concurrent ML in Guile Scheme
wingolog.org·1d·
Discuss: Hacker News
🔄Lens Laws
Experimental Evaluation of Post-Quantum Homomorphic Encryption for Privacy-Preserving V2X Communication
arxiv.org·1d
🔐Homomorphic Encryption
The Singularity Syndicate: Artifacts
hackernoon.com·9h
⏰Time Crystals
Lumo privacy and security model
proton.me·1d·
Discuss: Hacker News
🔐Homomorphic Encryption
(BT) Diversity from (LC) Diversity
golem.ph.utexas.edu·1d
🧮Kolmogorov Complexity
Axiom: Decentralized AI network that discovers, verifies, and archives truth
github.com·15h·
Discuss: Hacker News
🤝Distributed Consensus
External Network Penetration Testing and Best Practices
hackerone.com·9m
🕵️Penetration Testing
BVQC: A Backdoor-style Watermarking Scheme for Variational Quantum Circuits
arxiv.org·1d
🔐Quantum Cryptography
SIEVE — a better algorithm than LRU?
blog.apnic.net·1d
💨Cache Analysis
Shared secret: EDR killer in the kill chain
news.sophos.com·2h
🎫Kerberos Exploitation
Loading...Loading more...
AboutBlogChangelogRoadmap