Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
encryption, ciphers, cryptanalysis, PKI, hash functions
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186740
posts in
22.2
ms
The
Tyranny
of Security
✅
Formal Verification
javvadmalik.com
·
1d
Password
Management
🪝
eBPF
nthp.me
·
3d
·
Hacker News
Soundness
Failures in
LaBRADOR
Implementations from NTT -Friendly Rings
✅
Formal Verification
blog.zksecurity.xyz
·
17h
·
Hacker News
,
r/crypto
Beyond Code Reasoning: A
Specification-Anchored
Audit Framework for Expert-Augmented Security Verification
✅
Formal Verification
arxiv.org
·
20h
Kubernetes
Security from the
Ground
Up
🪝
eBPF
medium.com
·
2d
The Shadow Chain (Part II): PowerShell, SSL/TLS, and the Art of
Bypassing
Corporate
Firewalls
🪝
eBPF
medium.com
·
6d
Distributing
the
Keys
for Private Access to the Web
🪝
eBPF
cdt.org
·
1d
·
Lobsters
CKKS
—
Polynomials
, the Canonical Embedding, and Encoding
✅
Formal Verification
jeremykun.com
·
1d
·
Hacker News
Revocation
✅
Formal Verification
potaroo.net
·
5d
·
Hacker News
openSUSE
Lands Post-Quantum Hybrid Cryptography in Leap and
Tumbleweed
🪝
eBPF
9to5linux.com
·
2d
Why C Remains the Gold
Standard
for
Cryptographic
Software
🛡️
Memory Safety
wolfssl.com
·
6d
·
Lobsters
,
Hacker News
,
r/C_Programming
The Post-Quantum Security
Timeline
for Java:
JEP
496,
JEP
527, and What Teams Should Do Now
✅
Formal Verification
javacodegeeks.com
·
2d
Allocation
Update - Q1 2026
🪝
eBPF
blog.ethereum.org
·
2d
Mosaic
: Practical Malicious Security for
Garbled
Circuits on Bitcoin
🪝
eBPF
eprint.iacr.org
·
6d
Optically
reconfigurable physical
unclonable
functions based on 2D MoS 2 ring-oscillator arrays for attack-resistant hardware authentication
🔧
RISC-V
nature.com
·
2d
Week 17
🪝
eBPF
thisweekin4n6.com
·
4d
Dormant
Digital
Assets
🪝
eBPF
blog.dshr.org
·
2d
·
Blogger
Catching
the Fly: Practical Challenges in Making Blockchain
FlyClient
Real
🪝
eBPF
arxiv.org
·
20h
DslsDZC/HIC
: HIC: A hierarchical isolation kernel reference architecture. Unifying security, performance, and
modularity
in a single design, enabling deployment from embedded to cloud with full lifecycle evolution.
🐧
Linux Kernel
github.com
·
2d
·
Hacker News
Data Protection on AWS: Building an End-to-End Encryption Strategy for S3,
RDS
, and
Lambda
🪝
eBPF
medium.com
·
3d
« Page 1
·
Page 3 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help