Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
encryption, ciphers, cryptanalysis, PKI, hash functions
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
147934
posts in
19.5
ms
The
Joy
Of
Cryptography
(MIT Press)
📱
Mobile Security
i-programmer.info
·
3d
Towards Post-Quantum
Cryptography
in
TLS
(2019)
🛡️
Cybersecurity
blog.cloudflare.com
·
2d
·
Hacker News
Yikes
, Encryption’s
Y2K
Moment is Coming Years Early
📡
Network Security
eff.org
·
5h
A
Cryptography
Engineer’s Perspective on Quantum Computing
Timelines
🔧
Hardware Hacking
discuss.privacyguides.net
·
9h
Cryptanalysis of the
Legendre
Pseudorandom
Function over Extension Fields
🐛
Fuzzing
arxiv.org
·
2d
Hashing
vs
Encryption
: What’s the Difference and Which One Should You Use?
🦠
Malware Analysis
medium.com
·
2h
Security for the
Layperson
🛡️
Cybersecurity
dl.acm.org
·
18h
Hideout
– file encryption and
decryption
💥
Exploit Development
linuxlinks.com
·
4d
Dritonsallahu/risaal-crypto
:
Risaal
Crypto — Dart implementation of the Signal Protocol for end-to-end encrypted messaging.
📱
Mobile Security
github.com
·
2d
·
Hacker News
Deterministic Breach of Public-Key Cryptographic Systems (
RSA/ECC
) via Theorem IV
🐛
Fuzzing
medium.com
·
1h
My First OSINT
Capstone
: Unmasking “
sp1ritfyre
” from One Twitter Clue.
🔍
OSINT
medium.com
·
9h
Quantum cryptanalysis of
SPN
ciphers
with known plaintext
🐛
Fuzzing
nature.com
·
2d
Simplest
hash
functions
🐛
Fuzzing
purplesyringa.moe
·
4d
·
Hacker News
Compressed Key Exchange Protocol from
Orientations
of Large
Discriminant
Using AVX-512
🌐
computer networking
eprint.iacr.org
·
2d
Beyond
ChaCha20
and AES: Exploring Rational Quadratic Functions for Cryptographic
Randomness
🐛
Fuzzing
medium.com
·
3d
Cryptocurrency
Security and
Wallet
Protection
🦠
Malware Analysis
fromdev.com
·
2d
An In-Depth Analysis of Security,
Trustworthiness
, and Digital
Sovereignty
🦠
Malware Analysis
medium.com
·
1d
The Hidden Trap:
Rethinking
Security Through
Obscurity
🕵️
Threat Intelligence
medium.com
·
3d
Dots,
Dashes
, and Deception: How I Cracked
BSides
Seattle’s Cryptography CTF
🔧
Hardware Hacking
medium.com
·
1d
Going in
Circles
: Fourier,
Primes
, and the Quantum Threat to Cryptography
📱
Mobile Security
medium.com
·
4d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help