🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ‡ΈπŸ‡ͺ Nordic Cryptography

Scandinavian Security Research, Regional Standards, Cultural Encryption, Swedish Innovation

Encrypting identifiers in practice
sjoerdlangkemper.nlΒ·9h
🌊Stream Ciphers
Nordic acquires Memfault
nordicsemi.comΒ·23hΒ·
Discuss: Hacker News, r/embedded
βš™οΈNordic Assembly
Quantum computing: secure in the long term thanks to QKD
heise.deΒ·1h
πŸ”Quantum Security
Password-Derived Signature Authentication
github.comΒ·1dΒ·
Discuss: Hacker News
πŸ”’LDAP Security
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.orgΒ·1d
πŸ”’Bitwise Algorithms
Roeck Hansen, Birgitta, - Township and territory : a study of rural land-use and settlement patterns in Γ…land c. A.D. 500-1550 / Birgitta Roeck Hansen.
libris.kb.seΒ·1d
πŸ›οΈNordic Archives
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.comΒ·17h
πŸ”—Data Provenance
How to Combine a Guest Room and Office With One Stunning IKEA Hack
ikeahackers.netΒ·2h
❄️Nordic Design Philosophy
Trusting the tech: using password managers and passkeys to help you stay secure online
ncsc.gov.ukΒ·1d
πŸ”“Password Cracking
Bitmasking for Granular Backend RBAC: A Beginner's Guide
dev.toΒ·1hΒ·
Discuss: DEV
πŸ”Homomorphic Encryption
Swedish universities call for increased collaboration with China
thelocal.seΒ·7h
πŸ‡ΈSweden
Denmark Switches from Microsoft to LibreOffice and Linux
digitrendz.blogΒ·3hΒ·
Discuss: Hacker News
πŸ‡©πŸ‡°Danish Computing
Iranian Educated Manticore Targets Leading Tech Academics
research.checkpoint.comΒ·1h
🎫Kerberos Attacks
Wolf skulls reveal major 20th-century population turnover in Fennoscandia
phys.orgΒ·18m
🦴Database Paleontology
Diving deep into Binius M3 arithmetization using Merkle tree inclusion as an example
blog.lambdaclass.comΒ·1d
🌳Archive Merkle Trees
Exclusive deal: 4 months free with NordVPN's two-year plans, plus up to $50 in Amazon gift vouchers
techradar.comΒ·13m
🎬AV1 Encoding
How the US Military Is Redefining Zero Trust
darkreading.comΒ·1d
🌐Network Security
Digital Forensics Round-Up, June 25 2025
forensicfocus.comΒ·20m
πŸ”¬Archive Forensics
Portable Network Graphics (PNG) Specification (Third Edition)
w3.orgΒ·17hΒ·
Discuss: Hacker News
πŸ•ΈοΈWebP Analysis
How to (Almost) solve cybersecurity once and for all
adaptive.liveΒ·18hΒ·
Discuss: Hacker News
πŸ”Systems Hardening
Loading...Loading more...
AboutBlogChangelogRoadmap