๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”’ Privacy Preserving

Homomorphic Encryption, Differential Privacy, Federated Learning, Secure Computation

Secure and Efficient UAV-Based Face Detection via Homomorphic Encryption and Edge Computing
arxiv.orgยท2d
๐Ÿ”Homomorphic Encryption
A Wide Reduction Trick (2022)
words.filippo.ioยท6hยท
Discuss: Lobsters, Hacker News
๐ŸŒณArchive Merkle Trees
Privacy Is Web3โ€™s โ€œ0 To 1โ€ Moment
hackernoon.comยท17h
๐Ÿ”Homomorphic Encryption
WiSec 2025 Spotlight: Security in the Inaudible World
esat.kuleuven.beยท19h
๐Ÿ“กBluetooth Archaeology
Rethinking Distributed Computing for the AI Era
cacm.acm.orgยท14h
โšกIncremental Computation
New research connects quantum computing power to the security of cryptographic systems
phys.orgยท1d
๐Ÿ”Quantum Security
Welcoming Aura to Have I Been Pwned's Partner Program
troyhunt.comยท12h
๐Ÿ›กCybersecurity
Machine Learning Fundamentals: dimensionality reduction
dev.toยท17hยท
Discuss: DEV
๐Ÿ“Linear Algebra
Jaya Klara Brekke: โ€˜Know who runs your infrastructureโ€™
blog.okfn.orgยท12h
๐ŸŒNetwork Security
Courts Favor Targeted eDiscovery Collections, but It Is Up to In-House Teams to Enable Such Cost Saving Proportional Efforts
blog.x1discovery.comยท1d
โš–๏ธLegal Compliance
Brazil innovates on digital self-determination
protonvpn.comยท19h
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
On One-Shot Signatures, Quantum vs Classical Binding, and Obfuscating Permutations
arxiv.orgยท5h
๐Ÿ”Quantum Security
D3FL: Data Distribution and Detrending for Robust Federated Learning in Non-linear Time-series Data
arxiv.orgยท1d
๐Ÿง Machine Learning
Fully Patched SonicWall Gear Under Likely Zero-Day Attack
darkreading.comยท15h
๐Ÿ”“Hacking
Blog - Hey Signal! Great Encryption Needs Great Authentication
sequoia-pgp.orgยท20h
๐ŸŽฏNTLM Attacks
Effectively Zero-Knowledge Proofs for NP with No Interaction, No Setup
eccc.weizmann.ac.ilยท1dยท
Discuss: Hacker News
๐ŸŽฏInteractive Provers
A Minimal DDPM
github.comยท1dยท
Discuss: Hacker News
๐Ÿง Machine Learning
A Bayesian Incentive Mechanism for Poison-Resilient Federated Learning
arxiv.orgยท5h
๐ŸคSecure Multiparty
API Auth Is Deeper Than It Looks
nango.devยท16hยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
Exposed Secrets, Broken Trust: What the DOGE API Key Leak Teaches Us About Software Security
lmgsecurity.comยท10h
๐Ÿ”Cryptographic Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap