Feeds to Scour
SubscribedAll
Scoured 7678 posts in 216.1 ms
RISC-V and Post-Quantum Cryptography
fprox.substack.com·1d·
Discuss: Substack
🔢Homomorphic Encryption
Preview
Report Post
Decentralized Infrastructure for Digital Notarizing, Signing and Sharing Files using Blockchain
arxiv.org·1d
⛓️Blockchain
Preview
Report Post
Alice and Bob in Wonderland - Identity and authority without servers (2024)
herbcaudill.com·1d·
Discuss: Hacker News
🔐Decentralized Identity
Preview
Report Post
Python Cryptography Tutorial: Essential Security Tools for Encryption, Hashing, and Digital Signatures
dev.to·5d·
Discuss: DEV
🔢Homomorphic Encryption
Preview
Report Post
key
alk.bearblog.dev·2d
📂open source
Preview
Report Post
Post-Quantum Secure Aggregation via Code-Based Homomorphic Encryption
arxiv.org·1d
🔢Homomorphic Encryption
Preview
Report Post
Exploring Text Compression
denvaar.dev·1d
🗜️Compression Algorithms
Preview
Report Post
Kolmogorov Complexity
en.wikipedia.org·20h·
Discuss: Hacker News
🎯Hindley-Milner
Preview
Report Post
Tracing Personal Data Through APIs
hackernoon.com·21h
🛡️Privacy Engineering
Preview
Report Post
Getting Rounding Right in DeFi
seceureka.com·21h·
Discuss: Hacker News
🔓Binary Exploitation
Preview
Report Post
Variation on Iota
toolofthought.com·2d·
Discuss: Hacker News
λFunctional Programming
Preview
Report Post
How do lava lamps help with Internet encryption?
cloudflare.com·2d·
Discuss: Hacker News
🔢Homomorphic Encryption
Preview
Report Post
Technical Post: How we created a blind signatures model to anonymize user API requests
wardblog.substack.com·2d·
Discuss: Substack
🔐Decentralized Identity
Preview
Report Post
Designing an Authentication System: A Dialogue in Four Scenes (1997)
web.mit.edu·1h·
Discuss: Hacker News
🔐Decentralized Identity
Preview
Report Post
Understanding FIPS 202: The Design of Keccak, SHA-3, and Shake
codingpirate.com·5d·
Discuss: Hacker News
🔢Homomorphic Encryption
Preview
Report Post
Support me with advice and feedback
dev.to·6h·
Discuss: DEV
🌐IndieWeb
Preview
Report Post
SLSA: Safeguarding artifact integrity across any software supply chain
sam.roque-worcel.com·1d·
Discuss: Hacker News
🔍Static Analysis
Preview
Report Post
Local Privilege Escalation via Exposed XPC Method Due to Client Verification Failure
github.com·1d·
Discuss: Hacker News
🔓Binary Exploitation
Preview
Report Post
I decided to make a worse UUID for the pettiest of reasons.
gitpush--force.com·2d·
🐛Fuzzing
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help