🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🇸🇪 Nordic Cryptography

Scandinavian Security Research, Regional Standards, Cultural Encryption, Swedish Innovation

Making of SARE: Master Seeds in Hybrid Post-Quantum Encryption
zola.ink·22h·
Discuss: Hacker News
🌳Archive Merkle Trees
BDFirewall: Towards Effective and Expeditiously Black-Box Backdoor Defense in MLaaS
arxiv.org·5h
🛡️eBPF Security
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.be·1d
⚗️Algebraic Coding
Haugesund’s New Nordic Films Unveils Baltic Projects for Nordic Co-Production Market and Baltic Focus Program (EXCLUSIVE)
variety.com·2h
🏛️Nordic Archives
On This Day in Math - August 6
pballew.blogspot.com·4h·
Discuss: www.blogger.com
📐Mathematical Art
You know more Finnish than you think
dannybate.com·1d·
Discuss: Hacker News
🇸🇪Nordic Algorithms
It really is your last chance! Our exclusive NordVPN deal ends in 7 days – grab it while you still can
techradar.com·15h
📞WebRTC
The Coming Wave: Post-Quantum Cryptography and the Future of Cybersecurity
blog.publiccomps.com·1d·
Discuss: Hacker News
🔐Quantum Security
Looking back at Martin Gardner’s RSA article
johndcook.com·21h
🔲Lattice Cryptography
Important public announcement for Nässjö municipality
sverigesradio.se·1h
⚙️Swedish Assembly
More scientific papers being written with help of ChatGPT—especially in computer science
phys.org·17h
🧠Intelligence Compression
Why the Old Ways Are Still the Best for Most Cybercriminals
darkreading.com·19h
🎯Threat Hunting
Project AK47: Uncovering a Link to the SharePoint Vulnerability Attacks
unit42.paloaltonetworks.com·10h
🌐DNS Security
New Features Everywhere: Launching Version 14.3 of Wolfram Language & Mathematica
writings.stephenwolfram.com·15h·
Discuss: Hacker News
💧Liquid Types
(BT) Diversity from (LC) Diversity
golem.ph.utexas.edu·16h
🧮Kolmogorov Complexity
Quantum Leap in Measurement: New System Nears the Theoretical Limit of Physics
scitechdaily.com·4h
🔬Optical Physics
Where Matters: Location Feature Engineering for Search & Recs
shaped.ai·2d
📏Range Queries
Analysing Snapshot Isolation
muratbuffalo.blogspot.com·20h·
Discuss: www.blogger.com
🌳Persistent Data Structures
U.S. CISA adds D-Link cameras and Network Video Recorder flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com·3h
🛡Cybersecurity
Nakamoto Consensus from Multiple Resources
arxiv.org·1d
🤝Distributed Consensus
Loading...Loading more...
AboutBlogChangelogRoadmap