Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🌐 NetworkProtocols
TLS, Formal Specification, Protocol State Machines, Verification
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
182101
posts in
62.9
ms
Interactive Safety Verification of Distributed
Protocols
by
Inductive
Proof Decomposition
🌐
Protocol Synthesis
arxiv.org
·
5d
Additive
Cryptography for
TLS
🌐
DNS Security
snkth.com
·
2d
sigma-rs
: A Modular Approach for
Keyed-Verification
Anonymous Credentials
🔐
PAKE Protocols
eprint.iacr.org
·
4d
arian-gogani/nobulex
: The accountability primitive for AI agents. Cryptographic behavioral commitments with trustless verification.
🌳
Archive Merkle Trees
github.com
·
5d
·
Hacker News
,
Hacker News
Capacity
oracles
🎯
Performance Proofs
ethresear.ch
·
3d
LemmaScript
: A Verification Toolchain for TypeScript via
Dafny
✅
Format Verification
midspiral.com
·
5d
·
Lobsters
,
Hacker News
LibreSSL
4.3.1 Released
🔤
DSLs
undeadly.org
·
5d
·
Hacker News
midspiral/LemmaScript
: verification toolchain for TypeScript (Tech Preview)
🛡️
Proof-Carrying Archives
github.com
·
5d
·
Hacker News
Process-Mining of
Hypertraces
: Enabling Scalable Formal Security Verification of (Automotive) Network
Architectures
🔧
Hardware Verification
arxiv.org
·
3d
Mbed-TLS/TF-PSA-Crypto
: Reference implementation of the PSA Cryptography API
✅
Checksum Validation
github.com
·
5d
Certified
Program Synthesis with a Multi-Modal
Verifier
⚖️
Verification Calculi
arxiv.org
·
6d
Crash-free
Deductive
Verifiers
🛡️
Proof-Carrying Archives
arxiv.org
·
5d
SpecSyn
: LLM-based Synthesis and Refinement of Formal
Specifications
for Real-world Program Verification
⚖️
Verification Calculi
arxiv.org
·
3d
Mythos and the
Unverified
Cage:
Z3-Based
Pre-Deployment Verification for Frontier-Model Sandbox Infrastructure
⚖️
Verification Calculi
arxiv.org
·
4d
TLSCheck
2.0: An Enhanced Memory Forensics Approach to Efficiently Detect TLS
Callbacks
🧠
Memory Forensics
arxiv.org
·
4d
From Finite Enumeration to Universal Proof: Ring-Theoretic Foundations for
PQC
Hardware
Masking
Verification
⚡
Circuit Verification
arxiv.org
·
5d
SpecPylot
: Python
Specification
Generation using Large Language Models
📝
ABNF Parsing
arxiv.org
·
6d
FUSE:
Ensembling
Verifiers
with Zero Labeled Data
🧪
Binary Fuzzing
arxiv.org
·
6d
Extending
Contract Verification for Parallel Programming Models to
Fortran
⚡
Parallel Computing
arxiv.org
·
4d
Deductive
Verification of Weak Memory Programs with View-based
Protocols
(extended version)
🧠
Separation Logic
arxiv.org
·
3d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help