🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Swedish Cryptography

Regional Security Research, Nordic Standards, Cultural Encryption, Scandinavian Innovation

What are memories made of? A survey of neuroscientists
journals.plos.org·1d·
Discuss: Hacker News
🧲Magnetic Domains
Understanding Prolly Tree Balance
dolthub.com·1d·
Discuss: Hacker News
🌲B-tree Variants
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.org·2d·
Discuss: Hacker News
🔐Homomorphic Encryption
Excalidraw+ Is Now SoC 2 Certified
plus.excalidraw.com·3d·
Discuss: Hacker News
🔐PKI Archaeology
Why World's New 'Priority Lane' for Humans on the Blockchain Could Change Everything
hackernoon.com·13h
🤝Distributed Consensus
Here is a creative heading for the blog post: "The Phantom Hackers: Unmasking the Invisible Foes of
dev.to·12h·
Discuss: DEV
🛡Cybersecurity
How to Write a Software Project Proposal: Complete Template & Guide
dev.to·23h·
Discuss: DEV
🦋Format Metamorphosis
Ormer: A Manipulation-resistant and Gas-efficient Blockchain Pricing Oracle for DeFi
arxiv.org·2d
🔗Hash Chains
Technical Architecture Guide: Authorization Strategies for Multi-Merchant E-commerce Platforms
dev.to·1d·
Discuss: DEV
🔒WASM Capabilities
Add Single-sign-on To Your Applications With Keycloak and Learn... Takashi Norimatsu & Marek Posolda
youtube.com·8h
🔓Open Source Software
From Codicology to Code: A Comparative Study of Transformer and YOLO-based Detectors for Layout Analysis in Historical Documents
arxiv.org·1d
📃Manuscript Tokenization
The AI Geopolitical Race: A New Frontier in Global Power
dev.to·10h·
Discuss: DEV
🔲Cellular Automata
A Geometric Square-Based Approach to RSA Integer Factorization
arxiv.org·3d
🔱Galois Cryptography
CBF-AFA: Chunk-Based Multi-SSL Fusion for Automatic Fluency Assessment
arxiv.org·1d
🎙️Whisper
Floating-Point Data Transformation for Lossless Compression
arxiv.org·3d
🌊Streaming Compression
Hong Mong 5 Development Treasure Case Sharing Buried Point Development Real Battle Guide
dev.to·1d·
Discuss: DEV
🔗Data Provenance
Keeping Customer Data Safe in Small Transport Businesses
dev.to·1d·
Discuss: DEV
🚨Incident Response
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols(1750952117902400)
dev.to·13h·
Discuss: DEV
🌐Network Protocols
How Good Are Synthetic Requirements ? Evaluating LLM-Generated Datasets for AI4RE
arxiv.org·1h
🌀Brotli Internals
All you wanted to know about sw vulnerabilities…but were too busy to look into - DevConf.CZ 2025
youtube.com·20h
🔐CBOR
Loading...Loading more...
AboutBlogChangelogRoadmap