๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Cryptography

Encryption Algorithms, Public Key Infrastructure, Digital Signatures, Hash Functions

Searching for Privacy Risks in LLM Agents via Simulation
arxiv.orgยท12h
๐Ÿ›กCyber Security
Preventing Artificially Inflated SMS Attacks through Large-Scale Traffic Inspection
usenix.orgยท2d
๐Ÿ›กCyber Security
NTWR Prime - redundant security based on NTRU Prime and LWR problems
eprint.iacr.orgยท2d
๐Ÿง PKM Systems
Demystifying the (In)Security of QR Code-based Login in Real-world Deployments
usenix.orgยท2d
๐Ÿ›กCyber Security
Bistochastically private release of longitudinal data
arxiv.orgยท12h
๐Ÿ“ˆProductivity
Introducing Taxum - A Node.js Web Framework Inspired by Tower and Axum
reddit.comยท2hยท
Discuss: r/javascript
๐ŸชจObsidian
VeriPHY: Physical Layer Signal Authentication for Wireless Communication in 5G Environments
arxiv.orgยท1d
๐Ÿง PKM Systems
Show HN: FilterQL โ€“ A tiny query language for filtering structured data
github.comยท1dยท
Discuss: Hacker News
๐ŸชจObsidian
CarAT: Carbon Atom Tracing across Industrial Chemical Value Chains via Chemistry Language Models
arxiv.orgยท12h
๐Ÿง PKM Systems
MCP Vulnerabilities Every Developer Should Know
dev.toยท1dยท
Discuss: DEV
๐Ÿ›กCyber Security
Adaptive Fault-Tolerant Antenna Array Synthesis via Bayesian Optimization and Reinforcement Learning
dev.toยท4hยท
Discuss: DEV
๐Ÿง PKM Systems
Automated Prioritization of Clinical Trial Endpoint Validation Using Bayesian HyperNetworks
dev.toยท8hยท
Discuss: DEV
๐Ÿง PKM Systems
Building a Node.js Auth API: JWT, Bcrypt & Cookies
github.comยท15hยท
Discuss: DEV
๐Ÿ›กCyber Security
Cryptographic Implementation Flaws: Modern Encryption Analysis
dev.toยท5dยท
Discuss: DEV
๐Ÿ›กCyber Security
Decoding RFID: A comprehensive overview of security, attacks, and the latest innovations (WHY2025)
cdn.media.ccc.deยท3d
๐Ÿ›กCyber Security
Automated Exotic Particle Resonance Spectrum Prediction via Multi-Modal Data Fusion and Neural Network Optimization
dev.toยท5hยท
Discuss: DEV
๐Ÿง PKM Systems
'Lightweight cryptography' standard to protect small devices finalized
techxplore.comยท1d
๐Ÿ›กCyber Security
A Performance Comparison of the Homomorphic Encryption Schemes CKKS and TFHE
eprint.iacr.orgยท3d
๐Ÿง PKM Systems
Boring Cybersecurity Theory: Security Domains From CISSP
dev.toยท1dยท
Discuss: DEV
๐Ÿ›กCyber Security
Reversible Video Steganography Using Quick Response Codes and Modified ElGamal Cryptosystem
arxiv.orgยท3d
๐Ÿ›กCyber Security
Loading...Loading more...
AboutBlogChangelogRoadmap