🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Quantum Security

Post-quantum Cryptography, Lattice Cryptography, Key Exchange, Long-term Protection

Qclojure: Functional quantum computer programming library for Clojure
github.com·2d·
Discuss: Hacker News
⚛️Quantum Compilers
The most helpful books to apply disease modeling to enhance cybersecurity
shepherd.com·4h·
Discuss: Hacker News
⚛️Information Physics
An inner-speech decoder reveals some mental privacy issues
arstechnica.com·1h
🎧Learned Audio
'Rosetta stone' of code allows scientists to run core quantum computing operations
phys.org·2d
⚛️Quantum Circuits
Beyond the Hype: Critical Takeaways From BlackHat and Defcon
thenewstack.io·20h
🎯Threat Hunting
Imperfect light sources achieve new benchmark in secure quantum communication
phys.org·1d
🔐Quantum Cryptography
From Hashes to Signatures: Securing File Transfers with RSA/ECDSA Digital Signatures
dev.to·1d·
Discuss: DEV
✅Checksum Validation
Q-BEAST: A Practical Course on Experimental Evaluation and Characterization of Quantum Computing Systems
arxiv.org·2d
⚛️Quantum Compilers
CRYPTO 2025: Row Reduction Techniques for n-Party Garbling
esat.kuleuven.be·5d
🌊Stream Ciphers
China-linked Silk Typhoon APT targets North America
securityaffairs.com·4h
🔓Hacking
Micropycelium - prototype routable mesh network for ESP32
hackster.io·1d
🕸️Mesh Networking
Two quantum computers with 20 qubits manage to simulate information scrambling
phys.org·21h
⚛️Quantum Tape
Dangerous things should be difficult to do by accident
fexpr.blogspot.com·2d
✨Effect Handlers
What's the best practice to encrypt password?
reddit.com·1d·
Discuss: r/golang
🔐Archive Encryption
Optimizing multiprecision LLL in FLINT
fredrikj.net·2d
🧮Algebraic Datatypes
Advanced computer modeling predicts molecular-qubit performance
phys.org·22h
⚛️Quantum Storage
Are we solving digital identity or revealing we've lost what we're proving?
syntheticauth.ai·16h·
Discuss: Hacker News
🔐PKI Archaeology
Haraka Hash: A Look at AES-Based PoW for Blockchains
zola.ink·1d·
Discuss: Hacker News
🔗Hash Chains
Saleae Analyzer for the BDM protocol
zetier.com·2d
🔬Binary Analysis
Finding A New Model For Hacker Camps
hackaday.com·19h
🚀Indie Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap