🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Quantum Cryptography

Quantum Key Distribution, Shor's Algorithm, Post-quantum Security, Quantum Resistance

Offensive security tools 2025
hackertarget.comΒ·2d
🎯Threat Hunting
Qantas: Breach affects 6 million people, “significant” amount of data likely taken
malwarebytes.comΒ·17h
πŸ›‘Cybersecurity
Rapid Prototyping a Safe, Logless Reconfiguration Protocol for MongoDB with TLA+
mongodb.comΒ·13hΒ·
Discuss: Lobsters, Hacker News, r/programming
🀝Consensus Protocols
ClassDistribution is really neat
bernsteinbear.comΒ·1dΒ·
Discuss: Hacker News
πŸ“Code Metrics
Quantifying analogy of concepts via ologs and wiring diagrams
arxiv.orgΒ·1d
πŸ”—Topological Sorting
Mapping the adaptive landscape of Batesian mimicry using 3D-printed stimuli
nature.comΒ·13h
πŸ”²Cellular Automata
Have Object-Oriented Languages Missed a Trick with Class Function and its Subclasses?
arxiv.orgΒ·1d
β›ͺChurch Encoding
A Technique for the Detection of PDF Tampering or Forgery
arxiv.orgΒ·1d
πŸ’§Manuscript Watermarks
WebAssembly, β€˜Hyper VMs’ and Hypervisors: Fast Speeds, Intense Isolation
thenewstack.ioΒ·1d
🌐WASI
The Number of Trials Matters in Infinite-Horizon General-Utility Markov Decision Processes
arxiv.orgΒ·1d
🎯Performance Proofs
JavaScript Generators and Iterator Protocol
dev.toΒ·9hΒ·
Discuss: DEV
πŸ“Compiler Design
Enhancing Diffusion Posterior Sampling for Inverse Problems by Integrating Crafted Measurements
arxiv.orgΒ·2d
πŸŒ€Differential Geometry
Structure-preserving Lift & Learn: Scientific machine learning for nonlinear conservative partial differential equations
arxiv.orgΒ·1d
πŸŒ€Riemannian Computing
VSF-Med:A Vulnerability Scoring Framework for Medical Vision-Language Models
arxiv.orgΒ·1d
πŸ›‘οΈWASM Security
Quantifying Student Success with Generative AI: A Monte Carlo Simulation Informed by Systematic Review
arxiv.orgΒ·1h
πŸ—ΊοΈCompetency Maps
Trusting the Boot Process: Inside Bottlerocket's Security Architecture
molnett.euΒ·2dΒ·
Discuss: Hacker News
πŸ”’Secure Boot
Running Django & Java Apps in Containers β€” My Docker Week Recap
dev.toΒ·1dΒ·
Discuss: DEV
πŸ“¦Container Security
Python Fundamentals: authorization
dev.toΒ·16hΒ·
Discuss: DEV
πŸ”Capability Systems
Model Fusion via Neuron Interpolation
arxiv.orgΒ·1d
πŸ“ŠQuantization
U.S. Lawmakers Urge Action on Cybersecurity in Face of Quantum Threat
thequantuminsider.comΒ·6dΒ·
Discuss: Hacker News
πŸ”Quantum Security
Loading...Loading more...
AboutBlogChangelogRoadmap