Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Hash Functions, Public Key, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
5817
posts in
14.1
ms
Simplest
hash
functions
🌸
Bloom Filters
purplesyringa.moe
·
3d
·
Hacker News
Algorithms
for Modern
Hardware
⚙️
Performance Profiling
en.algorithmica.org
·
2h
·
Hacker News
Towards Post-Quantum
Cryptography
in
TLS
(2019)
🔢
Homomorphic Encryption
blog.cloudflare.com
·
1d
·
Hacker News
Dritonsallahu/risaal-crypto
:
Risaal
Crypto — Dart implementation of the Signal Protocol for end-to-end encrypted messaging.
🔢
Homomorphic Encryption
github.com
·
1d
·
Hacker News
The
Visible
Key
🔢
Homomorphic Encryption
aperceptualdrifter.substack.com
·
4d
·
Substack
A
Cryptography
Engineer’s Perspective on Quantum Computing
Timelines
⚖️
Consensus Networks
words.filippo.io
·
2d
·
Lobsters
,
Hacker News
,
r/crypto
Undetectable
Conversations Between AI Agents via
Pseudorandom
Noise-Resilient Key Exchange
🛡️
Byzantine Consensus
arxiv.org
·
2d
·
Hacker News
Google's
ZKP-hidden
quantum attack
🔢
Homomorphic Encryption
adlrocha.substack.com
·
4d
·
Substack
Cryptography
's "Five
Worlds
" [video]
🛡️
Authenticated Encryption
youtube.com
·
4d
·
Hacker News
Quantum computer researchers: Bitcoin
encryption
breakable
in a few years
🔢
Homomorphic Encryption
heise.de
·
5d
·
Hacker News
ameshdev/amesh
: Device-bound
M2M
authentication. Replace API keys with cryptographic device identity.
🛡️
Authenticated Encryption
github.com
·
1d
·
Hacker News
,
Hacker News
German implementation of
eIDAS
will
require
an Apple/Google account to function
🔑
Passkeys
bmi.usercontent.opencode.de
·
4d
·
Hacker News
Lightweight
framework-agnostic
security framework
☁️
Serverless Rust
shiro.apache.org
·
6d
·
Hacker News
Friday Archaeology: A Quarter-Century-Old Crypto Library, the Cult of the Dead Cow, and a
Rijndael
Buffer
Overwrite
🔓
Binary Exploitation
llama.gs
·
5d
·
Hacker News
ESP32-S3
gets post-quantum encryption with
Aethyr
Edge Node open-source firmware
🛡️
Authenticated Encryption
cnx-software.com
·
4d
·
Hacker News
Startup lets researchers
mine
blockchain
tasks on a quantum computer for the first time
⚖️
Consensus Networks
coindesk.com
·
6d
·
Hacker News
jtdowney/kryptos
: Cryptography library for Gleam targeting Erlang and JavaScript
🦕
Deno
github.com
·
6d
·
Hacker News
Tape Street – Adaptive Encryption via
Kinetic
Cryptography
🔢
Homomorphic Encryption
github.com
·
3d
·
Hacker News
Razshy/Resonance-Search
: A new search paradigm where documents have gravity, queries converge into
basins
, and multi-signal scoring uses interference instead of linear fusion.
📊
ClickHouse
github.com
·
5d
·
Hacker News
,
r/rust
Polygraph
: Signature generation algorithms for
polymorphic
worms (2005)
🐛
Fuzzing
github.com
·
4d
·
Hacker News
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help