🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🤐 Secure Multiparty

Privacy Computing, Federated Learning, Secret Sharing, Cryptographic Protocols

Air-FedGA: A Grouping Asynchronous Federated Learning Mechanism Exploiting Over-the-air Computation
arxiv.org·3h
🌐Federated Search
The Danish Sugar Beats Auction has a weird role in cryptography history
evervault.com·1d·
Discuss: Hacker News
🔐Homomorphic Encryption
AI, Antitrust & Privacy: When More Competition Makes Things Worse
nakedcapitalism.com·21h
🔲Cellular Automata
How Does PGP Encryption Work—and Is It Still Secure in 2025?
securityscorecard.com·15h
🔐Quantum Security
PrivTuner with Homomorphic Encryption and LoRA: A P3EFT Scheme for Privacy-Preserving Parameter-Efficient Fine-Tuning of AI Foundation Models
arxiv.org·1d
🔒Privacy Preserving
Federated Learning for Big Data: A Survey on Opportunities, Applications, and Future Directions
arxiv.org·1d
🧠Machine Learning
Exploring Adversarial Attacks on the MaSTer Truncation Protocol
esat.kuleuven.be·1d
💻Local LLMs
Cryptexes, AI and Creedence Clearwater Revival
eclecticlight.co·1h
🔌Operating system internals
Announcing FOKS, the Federated Open Key Service
blog.foks.pub·17h·
Discuss: Lobsters, Hacker News
🏠Homelab Federation
QuHE: Optimizing Utility-Cost in Quantum Key Distribution and Homomorphic Encryption Enabled Secure Edge Computing Networks
arxiv.org·3h
🔲Lattice Cryptography
Encryption and Decryption in Go: A Hands-On Guide
dev.to·13h·
Discuss: DEV
🌊Stream Ciphers
We Need AI Systems That Can Govern Themselves
cacm.acm.org·12h
⚡Incremental Computation
Generalized and Unified Equivalences between Hardness and Pseudoentropy
arxiv.org·3h
🧮Kolmogorov Complexity
Censorship, Surveillance, and the Splinternet: Why We Need a Decentralized Web
hackernoon.com·1d
🖥️Self-hosted Infrastructure
Distributed Systems for Fun and Profit
book.mixu.net·1d·
Discuss: Hacker News
🌊Streaming Systems
Aim High, Stay Private: Differentially Private Synthetic Data Enables Public Release of Behavioral Health Information with High Utility
arxiv.org·1d
🔐Homomorphic Encryption
PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing
arxiv.org·3h
🎯Threat Hunting
Early Signs of Steganographic Capabilities in Frontier LLMs
arxiviq.substack.com·18h·
Discuss: Substack
💻Local LLMs
DESIGN: Encrypted GNN Inference via Server-Side Input Graph Pruning
arxiv.org·3h
🔐Homomorphic Encryption
The Free Rider Problem
plato.stanford.edu·10h·
Discuss: Hacker News
🔲Cellular Automata
Loading...Loading more...
AboutBlogChangelogRoadmap