๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒŠ Stream Ciphers

Real-time Encryption, Hardware Security, Cryptographic Sequences, Linear Feedback

Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.comยท22h
๐Ÿ”Cryptographic Archaeology
Show HN: Novel GPT-2 sampling and memory architecture
github.comยท4hยท
Discuss: Hacker News
๐Ÿ’ŽInformation Crystallography
Locally Differentially Private Multi-Sensor Fusion Estimation With System Intrinsic Randomness
arxiv.orgยท1d
๐Ÿ›ก๏ธDifferential Privacy
Cybersecurity Snapshot: Industrial Systems in Crosshairs of Russian Hackers, FBI Warns, as MITRE Updates List of Top Hardware Weaknesses
tenable.comยท1d
๐Ÿ”“Hacking
9 Best Keyboards (2025), Tested and Reviewed
wired.comยท56m
โŒจ๏ธMechanical Keyboards
Optimizing multiprecision LLL in FLINT
fredrikj.netยท2d
๐ŸงฎAlgebraic Datatypes
Hacker and Physicist โ€“ A Tale of "Common Sense"
supasaf.comยท21hยท
Discuss: Hacker News
๐Ÿ”Cryptographic Archaeology
Saleae Analyzer for the BDM protocol
zetier.comยท2d
๐Ÿ”ฌBinary Analysis
busy beaver function
ncatlab.orgยท4h
โš”๏ธLean Theorem
**Mastering HTTP/2 Server Performance Optimization in Go for High-Traffic Applications**
dev.toยท19hยท
Discuss: DEV
โšกgRPC
ReVault Flaw Exposed Millions of Dell Laptops to Malicious Domination
darkreading.comยท17h
๐Ÿ”“Hacking
Whatโ€™s hierarchical about a hierarchical wallet?
johndcook.comยท1h
๐ŸŒณArchive Merkle Trees
Imperfect light sources achieve new benchmark in secure quantum communication
phys.orgยท1d
๐Ÿ”Quantum Cryptography
Micropycelium - prototype routable mesh network for ESP32
hackster.ioยท1d
๐Ÿ•ธ๏ธMesh Networking
Haraka Hash: A Look at AES-Based PoW for Blockchains
zola.inkยท1dยท
Discuss: Hacker News
๐Ÿ”—Hash Chains
MoQ: Refactoring the Internet's real-time media stack
blog.cloudflare.comยท23hยท
Discuss: Hacker News
๐Ÿ“žWebRTC
Hackers deploy DripDropper via Apache ActiveMQ flaw, patch systems to evade detection
securityaffairs.comยท1d
๐Ÿ”“Hacking
WeakC4, or Distilling an Emergent Object
2swap.github.ioยท13hยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
CRYPTO 2025: Row Reduction Techniques for n-Party Garbling
esat.kuleuven.beยท5d
๐Ÿ”Homomorphic Encryption
I'm too dumb for Zig's new IO interface
openmymind.netยท1dยท
Discuss: Lobsters, Hacker News, Hacker News
๐ŸŒNetworkProtocols
Loading...Loading more...
AboutBlogChangelogRoadmap