🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Quantum Cryptography

Quantum Key Distribution, Shor's Algorithm, Post-quantum Security, Quantum Resistance

3D Printed Portable Air Quality Monitor using Beetle ESP32C3
hackster.io·16h
🔌Single Board PC
Fun OCaml 2025
fun-ocaml.com·5h·
Discuss: Hacker News
🧬Functional Programming
Single quantum device that measures amperes, volts and ohms could revolutionize how we measure electricity
phys.org·3d
⚛️Quantum Tape
Linux desktop on Apple Silicon M1 in practice
gist.github.com·1h·
Discuss: Hacker News
🔌Operating system internals
Quantum Entanglement-Driven Resource Allocation for Dynamic Network Resilience
dev.to·5d·
Discuss: DEV
⚛️Quantum Tape
We now have the math to describe 'matrix tides'
buffalo.edu·1d·
Discuss: Hacker News
🌀Differential Geometry
BSI: A little more e-mail security – and still room for improvement
heise.de·1d
🔤EBCDIC Privacy
Programmable Anyon Mobility through Higher Order Cellular Automata
arxiv.org·3d
🔲Cellular Automata
Advanced Oxide Trap Characterization via Dynamic Bias Stress & Quantum Dot Mapping
dev.to·1d·
Discuss: DEV
🔧Hardware Verification
Icepath: a 2D Programming Language
healeycodes.com·1d·
Discuss: Hacker News, Hacker News
🔗Concatenative Programming
Computed Tomography
fab.cba.mit.edu·2d·
Discuss: Hacker News
🌀Fractal Compression
Aura-CAPTCHA: A Reinforcement Learning and GAN-Enhanced Multi-Modal CAPTCHA System
arxiv.org·1d
🔲Cellular Automata
Scientists Discover Strange New Quantum Behavior in Superconducting Material
scitechdaily.com·6h
⏰Time Crystals
Scalable Quantum Annealing-Enhanced Topological Superconductor Design Optimization via Hyperdimensional Embedding
dev.to·3d·
Discuss: DEV
🕸️Tensor Networks
My tips for using LLM agents to create software
efitz-thoughts.blogspot.com·21h·
Discuss: Hacker News
⚡Proof Automation
Qimem: Open-Source Rust Crypto Toolkit. Help Us Build It
github.com·10h·
Discuss: Hacker News
🦀Rust Macros
Digital ID wallets: a secure solution to age verification or another privacy disaster?
techradar.com·14h
🇸🇪Nordic Cryptography
Knuth’s Twindragon
johndcook.com·9h
📐Mathematical Art
Cracking the Density Code: Why MAF Flows Where KDE Stalls
towardsdatascience.com·1d
🔗Tailscale
The Cost of Winning:How RL Training on Poker Leads to Evil LLMs
tobysimonds.com·23h·
Discuss: Hacker News
🔲Cellular Automata
Loading...Loading more...
AboutBlogChangelogRoadmap