🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” RISC-V Cryptography

Hardware Security Extensions, Vector Cryptography, Open Security Architecture

Blazing matrix products
panadestein.github.ioΒ·1dΒ·
Discuss: Lobsters, Hacker News
⚑SIMD Optimization
How to Create Secure AI Applications
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”’Language-based security
This Week in Security: MegaOWNed, Store Danger, and FileFix
hackaday.comΒ·14h
πŸ”“Hacking
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.orgΒ·3d
πŸ”’Bitwise Algorithms
Pwn2Own Ireland 2024 – Ubiquiti AI Bullet
blog.compass-security.comΒ·1d
πŸ›‘οΈeBPF Security
Protect now, reveal later: a scalable Time-Lock Puzzle solution
benthamsgaze.orgΒ·15h
🌊Stream Ciphers
Security vulnerabilities in nearly 750 multifunction printers of various brands
heise.deΒ·17h
πŸ’£ZIP Vulnerabilities
30 Days of Malware Analysis - What trends can be observed?
cstromblad.comΒ·1d
🦠Malware Analysis
Bought myself an Ampere Altra system
marcin.juszkiewicz.com.plΒ·7h
⚑Circuit Archaeology
So you CAN turn an entire car into a video game controller
theregister.comΒ·10h
βš™οΈCassette Mechanics
I made a CPU stability testing tool - Threadstepper
reddit.comΒ·3hΒ·
Discuss: r/linux
⚑Performance Tools
Rust in the Linux kernel: part 2
lwn.netΒ·3hΒ·
Discuss: Hacker News, r/programming
πŸ¦€Rust Borrowing
CISA: AMI MegaRAC bug enabling server hijacks exploited in attacks
bleepingcomputer.comΒ·7hΒ·
Discuss: Hacker News
πŸ”“Hacking
FreeBSD Enhances Ports and Packages Security
discoverbsd.comΒ·17h
πŸ”ŒOperating system internals
Running shadow system tests in RISC-V
ikerexxe.github.ioΒ·2d
πŸ‘‘RISC-V Privilege
Reverse Engineering the Microchip CLB Part 1: Background and Reverse Engineering the BLEs
mcp-clb.markomo.meΒ·1dΒ·
Discuss: Lobsters, Hacker News, r/embedded
πŸ”¬Binary Analysis
Lunar Spider – Lotus V2 Loader Campaign Using Fake CAPTCHA Delivery and DLL Sideloading
research.kudelskisecurity.comΒ·15h
🎫Kerberos Exploitation
Encrypting identifiers in practice
sjoerdlangkemper.nlΒ·2d
🌊Stream Ciphers
Out-of-Band, Part 1: The new generation of IP KVMs and how to find them
runzero.comΒ·1dΒ·
Discuss: Hacker News
πŸ•ΈοΈWASM Archives
nimbme – Nim bare-metal environment
github.comΒ·6hΒ·
Discuss: Hacker News
🎯Emulation Accuracy
Loading...Loading more...
AboutBlogChangelogRoadmap