🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Swedish Cryptography

Regional Security Research, Nordic Standards, Cultural Encryption, Scandinavian Innovation

Walikancrypt
github.comΒ·14hΒ·
Discuss: Hacker News
πŸ‡ΈπŸ‡ͺSwedish Cryptanalysis
DiVerify: Hardening Identity-Based Software Signing with Programmable Diverse-Context Scopes
arxiv.orgΒ·25m
πŸ”PKI Archaeology
Measuring cryptographic strength in liters of boiling water
johndcook.comΒ·1dΒ·
Discuss: Hacker News
🌊Stream Ciphers
Top 10 Cybersecurity Companies in Europe
heimdalsecurity.comΒ·1d
πŸ›‘Cybersecurity
Fractal Geometry as the Blueprint for Encryption
hackernoon.comΒ·1d
πŸ”Homomorphic Encryption
How Sweden plans to get tougher than Denmark on immigration
thelocal.seΒ·14h
πŸ‡ΈSweden
Worth Reading 090325
rule11.techΒ·11h
πŸ”“Hacking
Spatial joint profiling of DNA methylome and transcriptome in tissues
nature.comΒ·12h
🧬Copy Number Variants
Japan, South Korea Take Aim at North Korean IT Worker Scam
darkreading.comΒ·3h
πŸ›‘Cybersecurity
Disintegration Fingerprinting: A low-cost, easy tool to identify fake medicines
medrxiv.orgΒ·3hΒ·
Discuss: Hacker News
πŸ”¬Binary Analysis
After Sandisk, D-Matrix is proposing an intriguing alternative to the big HBM AI puzzle with 10x better performance with 10x better energy efficiency
techradar.comΒ·8h
πŸ–₯️Modern Terminals
[$] Tracking trust with Rust in the kernel
lwn.netΒ·12h
πŸ¦€Rust Borrowing
Sweden moves students off digital devices and on to books and handwriting
theguardian.comΒ·6hΒ·
Discuss: Hacker News
πŸ‡ΈSweden
Investigating a Mysteriously Malformed Authenticode Signature
elastic.coΒ·4h
πŸ§ͺBinary Fuzzing
Civics Is Boring. So, Let's Encrypt Something
queue.acm.orgΒ·1dΒ·
Discuss: Hacker News
πŸ”’Language-based security
Digital Forensics Round-Up, September 03 2025
forensicfocus.comΒ·13h
🚨Incident Response
The Invisible Fingerprint: Securing Industry 4.0 with Adaptive AI Watermarks by Arvind Sundararajan
dev.toΒ·12hΒ·
Discuss: DEV
πŸ”Vector Forensics
1965 Cryptanalysis Training Workbook Released by the NSA
schneier.comΒ·1dΒ·
Discuss: Hacker News
πŸ”Cryptographic Archaeology
Crooks turn HexStrike AI into a weapon for fresh vulnerabilities
securityaffairs.comΒ·8h
πŸ”“Hacking
Secure Password Generator Based on Secure Pseudo-Random Number Generator
arxiv.orgΒ·25m
πŸ”“Password Cracking
Loading...Loading more...
AboutBlogChangelogRoadmap