Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
encryption, ciphers, cryptanalysis, PKI, hash functions
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
184423
posts in
27.5
ms
Additive
Cryptography for
TLS
✅
Formal Verification
snkth.com
·
5d
Can
Cross-Layer
Design Bridge Security and Efficiency? A Robust
Authentication
Framework for Healthcare Information Exchange Systems
🪝
eBPF
arxiv.org
·
10h
Post Quantum
Cryptography
Group
✅
Formal Verification
lclhost.org
·
1d
·
Hacker News
Help Net Security
🪝
eBPF
sh.itjust.works
·
1h
Cryptography
challenges @
KalmarCTF
2026
🪝
eBPF
blog.zksecurity.xyz
·
2d
·
Hacker News
As someone who works on the Linux kernel's cryptography code, the
regularly
occu
...
🐧
Linux Kernel
news.ycombinator.com
·
14h
·
Hacker News
New
Techniques
for Communication-Efficient Secure Comparison
Protocols
⚡
Concurrency
eprint.iacr.org
·
6d
Security is a
composite
system
🔌
Networking
aleksei.dev
·
17h
Password
Management
🪝
eBPF
nthp.me
·
2d
Post-quantum encryption for Cloudflare
IPsec
is
generally
available
🪝
eBPF
blog.cloudflare.com
·
40m
Full Disclosure: [
IWCC
2026] CfP: 15th International Workshop on Cyber Crime -
Linköping
, Sweden, Aug 24-27, 2026
🪝
eBPF
seclists.org
·
20h
DslsDZC/HIC
: HIC: A hierarchical isolation kernel reference architecture. Unifying security, performance, and
modularity
in a single design, enabling deployment from embedded to cloud with full lifecycle evolution.
🐧
Linux Kernel
github.com
·
1d
·
Hacker News
GnuPG
– post-quantum crypto landing in
mainline
🪝
eBPF
lists.gnupg.org
·
4d
·
Hacker News
What are the most common
authentication
methods
?
🪝
eBPF
techtarget.com
·
21h
Quantum-Resilient
Cryptography
in the
openSUSE
Ecosystem
🛡️
Memory Safety
news.opensuse.org
·
2d
Protecting
your secrets from
tomorrow
’s quantum risks
✅
Formal Verification
aws.amazon.com
·
5d
Quantum
Computers
Are Coming to Break
Cryptography
Faster Than Anyone Expected
✅
Formal Verification
singularityhub.com
·
2d
Kubernetes
Security from the
Ground
Up
🪝
eBPF
medium.com
·
2d
Solving
Hidden Number Problems Without
Lattices
📊
Algorithms
leetarxiv.substack.com
·
3d
·
Substack
,
r/programming
Upgrade any Ethereum wallet to post-quantum security in one transaction using
ZK
proofs
with a hidden public key
🪝
eBPF
ethresear.ch
·
1d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help