Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
encryption, ciphers, cryptanalysis, PKI, hash functions
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
184197
posts in
37.2
ms
Upgrade any Ethereum wallet to post-quantum security in one transaction using
ZK
proofs
with a hidden public key
🔧
Hardware Hacking
ethresear.ch
·
1d
The Shadow Chain (Part II): PowerShell, SSL/TLS, and the Art of
Bypassing
Corporate
Firewalls
📡
Network Security
medium.com
·
6d
Soundness
Failures in
LaBRADOR
Implementations from NTT -Friendly Rings
🐛
Fuzzing
blog.zksecurity.xyz
·
7h
·
Hacker News
openSUSE
Lands Post-Quantum Hybrid Cryptography in Leap and
Tumbleweed
⚙️
Binary Exploitation
9to5linux.com
·
2d
Revocation
🎭
Social Engineering
potaroo.net
·
4d
·
Hacker News
Beyond Code Reasoning: A
Specification-Anchored
Audit Framework for Expert-Augmented Security Verification
🐛
Fuzzing
arxiv.org
·
11h
CKKS
—
Polynomials
, the Canonical Embedding, and Encoding
🐛
Fuzzing
jeremykun.com
·
1d
·
Hacker News
Distributing
the
Keys
for Private Access to the Web
🎭
Social Engineering
cdt.org
·
1d
·
Lobsters
Why C Remains the Gold
Standard
for
Cryptographic
Software
💥
Exploit Development
wolfssl.com
·
5d
·
Lobsters
,
Hacker News
,
r/C_Programming
The Accidental
Ancestor
— How a Computer for
Verifying
Numbers Shaped Modern Hashing
🔧
Hardware Hacking
0xkrt26.github.io
·
2d
·
Hacker News
hcrypto
_
evp
(3) Linux Manual Page
🔧
Hardware Hacking
systutorials.com
·
6d
The Post-Quantum Security
Timeline
for Java:
JEP
496,
JEP
527, and What Teams Should Do Now
🔧
Hardware Hacking
javacodegeeks.com
·
2d
Allocation
Update - Q1 2026
🔬
Security Research
blog.ethereum.org
·
1d
Alterion-Software/alterion-encrypt
: A full end-to-end encryption pipeline for Actix-web —
X25519
ECDH key exchange, AES-256-GCM session encryption, Argon2id password hashing, and a MessagePack + Deflate request/response pipeline, all behind a single middleware.
💥
Exploit Development
github.com
·
3d
·
r/rust
Software
💿
software
news.ycombinator.com
·
2d
·
Hacker News
Mosaic
: Practical Malicious Security for
Garbled
Circuits on Bitcoin
🔧
Hardware Hacking
eprint.iacr.org
·
5d
Optically
reconfigurable physical
unclonable
functions based on 2D MoS 2 ring-oscillator arrays for attack-resistant hardware authentication
🔧
Hardware Hacking
nature.com
·
2d
An
Unsolved
Cipher
🛠️
Ghidra
futilitycloset.com
·
2d
Week 17
🕵️
Threat Intelligence
thisweekin4n6.com
·
4d
Dormant
Digital
Assets
💥
Cyberattack
blog.dshr.org
·
2d
·
Blogger
« Page 1
·
Page 3 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help