🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Swedish Cryptography

Regional Security Research, Nordic Standards, Cultural Encryption, Scandinavian Innovation

Walikancrypt
github.comΒ·23hΒ·
Discuss: Hacker News
πŸ‡ΈπŸ‡ͺSwedish Cryptanalysis
DiVerify: Hardening Identity-Based Software Signing with Programmable Diverse-Context Scopes
arxiv.orgΒ·9h
πŸ”PKI Archaeology
Quantum-Safe Security is a Toolbox, Not a Single Solution
labs.ripe.netΒ·1h
πŸ”Quantum Security
Show HN: I built a tool that turns cryptography papers into working Python code
paperstoapp.comΒ·3hΒ·
Discuss: Hacker News
πŸ”—Hash Chains
No Abba, no meatballs? Sweden’s new cultural canon is a listicle that will soon be forgotten | Gabriel V Rindborg
theguardian.comΒ·9h
🎨Swedish Design Philosophy
Fractal Geometry as the Blueprint for Encryption
hackernoon.comΒ·1d
πŸ”Homomorphic Encryption
Top 10 Cybersecurity Companies in Europe
heimdalsecurity.comΒ·1d
πŸ›‘Cybersecurity
Rare Iron Age ingot found in Sweden sheds light on ancient Baltic networks
phys.orgΒ·37m
✈️Datasaab Archaeology
A Practical Approach for Post-Quantum Migration With Hybrid Clouds
darkreading.comΒ·15h
πŸ”Quantum Security
Measuring cryptographic strength in liters of boiling water
johndcook.comΒ·1dΒ·
Discuss: Hacker News
🌊Stream Ciphers
Worth Reading 090325
rule11.techΒ·20h
πŸ”“Hacking
[CFP] European Defense & Security Law & Policy Quarterly (EDSeQ)
europeanlawblog.euΒ·5h
πŸ›οΈPREMIS Metadata
Spatial joint profiling of DNA methylome and transcriptome in tissues
nature.comΒ·21h
🧬Copy Number Variants
Retail Under Siege: How Ransomware Is Rewriting The Rules Of Digital Forensics In The UK
forensicfocus.comΒ·2h
🚨Incident Response
South Asian APT Hackers Deploy Novel Android Malware Against Military-Adjacent Phones
zimperium.comΒ·19m
πŸ›‘Cybersecurity
Disintegration Fingerprinting: A low-cost, easy tool to identify fake medicines
medrxiv.orgΒ·12hΒ·
Discuss: Hacker News
πŸ”¬Binary Analysis
[$] Tracking trust with Rust in the kernel
lwn.netΒ·21h
πŸ¦€Rust Borrowing
Investigating a Mysteriously Malformed Authenticode Signature
elastic.coΒ·13h
πŸ§ͺBinary Fuzzing
Civics Is Boring. So, Let's Encrypt Something
queue.acm.orgΒ·1dΒ·
Discuss: Hacker News
πŸ”’Language-based security
The Invisible Fingerprint: Securing Industry 4.0 with Adaptive AI Watermarks by Arvind Sundararajan
dev.toΒ·21hΒ·
Discuss: DEV
πŸ”Vector Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap