🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Quantum Security

Post-quantum Cryptography, Lattice Cryptography, Key Exchange, Long-term Protection

Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.comΒ·5d
πŸ”Quantum Cryptography
Whirlaway: Multilinear STARKs using WHIR as polynomial commitment scheme
blog.lambdaclass.comΒ·1d
🎯Performance Proofs
A low-cost protocol enables preparation of magic states and fault-tolerant universal quantum computation
phys.orgΒ·2d
βš›οΈQuantum Error Correction
How quantum computing would effect Bitcoin
johndcook.comΒ·12hΒ·
Discuss: Hacker News
πŸ”Quantum Cryptography
Scientists Crack a 40-Year Puzzle in Unbreakable Encryption
scitechdaily.comΒ·2d
πŸ”Quantum Cryptography
Neglecton Particles Could Be Key to More Stable Quantum Computers
scientificamerican.comΒ·12h
βš›οΈInformation Physics
Differentially Private Federated Quantum Learning via Quantum Noise
arxiv.orgΒ·1d
βš›οΈQuantum Channels
Quantum internet: Classical network technology transmits quantum information
heise.deΒ·2d
βš›οΈQuantum Channels
DIAC ∞ 2: A Post-Quantum, P=NP-Resistant Hybrid Encryption System
osf.ioΒ·4dΒ·
Discuss: Hacker News
πŸ”²Lattice Cryptography
ConsciousCoin: When Consciousness Becomes Its Own Proof
dev.toΒ·10hΒ·
Discuss: DEV
πŸ”—Hash Chains
Engineers send quantum signals with standard internet protocol
blog.seas.upenn.eduΒ·2dΒ·
Discuss: Hacker News
βš›οΈQuantum Codecs
This Week in Security: DEF CON Nonsense, Vibepwned, and 0-days
hackaday.comΒ·1d
πŸ”“Hacking
Tradeoffs of Highly-Expressive Types
jnkr.techΒ·3hΒ·
Discuss: Hacker News
🎯Gradual Typing
Securing the AI "Before Times”
paloaltonetworks.comΒ·2d
🎯Threat Hunting
Budgeting for a PQC Future
medium.comΒ·4d
πŸ”²Lattice Cryptography
Bruteforcing pwgen passwords
blog.sesse.netΒ·13hΒ·
Discuss: Hacker News
πŸ”“Password Cracking
El Salvador’s Bitcoin and Quantum Computing
johndcook.comΒ·11hΒ·
Discuss: Hacker News
πŸ”Quantum Cryptography
A brief history of the Secure Enclave
eclecticlight.coΒ·16h
πŸ›‘οΈRISC-V Security
New Theory Casually Upends Space and Time
popularmechanics.comΒ·10h
⏰Time Crystals
How a well-trained New Zealand dog took on quantum computers – and won
newscientist.comΒ·3d
πŸ”Quantum Cryptography
Loading...Loading more...
AboutBlogChangelogRoadmap