🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ‡ΈπŸ‡ͺ Nordic Cryptography

Scandinavian Security Research, Regional Standards, Cultural Encryption, Swedish Innovation

Show HN: SecretMemoryLocker – File Encryption Without Static Passwords
news.ycombinator.comΒ·8hΒ·
Discuss: Hacker News
πŸ”Archive Encryption
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.comΒ·16h
πŸ”Quantum Security
International Conference on Enumerative Combinatorics and Applications ICECA 2025 (August 25-27, 2025)
gilkalai.wordpress.comΒ·1d
πŸ”—Combinatory Logic
Dac-Fake: A Divide and Conquer Framework for Detecting Fake News on Social Media
arxiv.orgΒ·21h
πŸ”BitFunnel
Code does not lie
nocomplexity.comΒ·16h
πŸ”’Language-based security
It takes 26 yottabytes of RAM to typecheck a union of Safe Integers
playfulprogramming.comΒ·1d
πŸ§ͺBinary Fuzzing
noble-curves: audited and minimal elliptic curve cryptography in JavaScript
github.comΒ·6hΒ·
Discuss: Hacker News
πŸ”±Galois Cryptography
Folder with sensitive info about Sweden's Nato accession left behind at airport
sverigesradio.seΒ·13h
πŸ”Swedish Cryptography
Hook Version 3: The Banking Trojan with The Most Advanced Capabilities
zimperium.comΒ·12h
πŸ›‘οΈARM TrustZone
Knowledge and Common Knowledge in a Distributed Environment, Part 2
emptysqua.reΒ·14h
🀝Paxos Consensus
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.comΒ·11h
πŸ›‘Cybersecurity
Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.comΒ·3d
πŸ”Cryptographic Archaeology
Finland builds fence at eastern frontier, now a critical Nato border with Russia
theguardian.comΒ·10h
πŸ‡ΈπŸ‡ͺSwedish Cryptanalysis
Song recommendations with F# free monads
blog.ploeh.dkΒ·17h
πŸ”—Functional Compilers
NordVPN deal: Get a two-year plan for up to 77 percent off
engadget.comΒ·12h
πŸ“žWebRTC
Go module for brute force attacks on SSH steals the accesses found
heise.deΒ·14h
πŸ›£οΈBGP Hijacking
Quality Precision
lesswrong.comΒ·7hΒ·
Discuss: Hacker News
βœ…FLAC Verification
New Keeb
theworksofegan.netΒ·3h
⌨️Mechanical Keyboards
Wayland Compositors – Why and How to Handle Privileged Clients (2014)
mupuf.orgΒ·19hΒ·
Discuss: Hacker News
πŸ”“Password Cracking
Trust Spanning Protocol (TSP) Specification
trustoverip.github.ioΒ·10hΒ·
Discuss: Hacker News
🌳Archive Merkle Trees
Loading...Loading more...
AboutBlogChangelogRoadmap