Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Hash Functions, Public Key, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
184338
posts in
24.0
ms
Post Quantum
Cryptography
Group
⚖️
Consensus Networks
lclhost.org
·
1d
·
Hacker News
How do digital
signatures
work?
🔐
Decentralized Identity
techtarget.com
·
6d
Can
Cross-Layer
Design Bridge Security and Efficiency? A Robust
Authentication
Framework for Healthcare Information Exchange Systems
🔢
Homomorphic Encryption
arxiv.org
·
13h
Secure
signatures
without a private key
🔐
Decentralized Identity
katexochen.aro.bz
·
1d
·
Lobsters
,
Hacker News
Additive
Cryptography for
TLS
🔢
Homomorphic Encryption
snkth.com
·
5d
Cryptography
challenges @
KalmarCTF
2026
🔢
Homomorphic Encryption
blog.zksecurity.xyz
·
2d
·
Hacker News
GnuPG
– post-quantum crypto landing in
mainline
🔵
Unikernels
lists.gnupg.org
·
4d
·
Hacker News
New
Techniques
for Communication-Efficient Secure Comparison
Protocols
🔢
Homomorphic Encryption
eprint.iacr.org
·
6d
Protecting
your secrets from
tomorrow
’s quantum risks
🛡️
Authenticated Encryption
aws.amazon.com
·
5d
Revocation
🔐
Decentralized Identity
potaroo.net
·
4d
·
Hacker News
Alterion-Software/alterion-encrypt
: A full end-to-end encryption pipeline for Actix-web —
X25519
ECDH key exchange, AES-256-GCM session encryption, Argon2id password hashing, and a MessagePack + Deflate request/response pipeline, all behind a single middleware.
🛡️
Authenticated Encryption
github.com
·
4d
·
r/rust
Training Machine Learning Models on
Encrypted
Data: A Privacy-Preserving Framework using
Homomorphic
Encryption
🔢
Homomorphic Encryption
arxiv.org
·
2d
Solving
Hidden Number Problems Without
Lattices
🔢
Homomorphic Encryption
leetarxiv.substack.com
·
3d
·
Substack
,
r/programming
Prime-Field
PINI
: Machine-Checked Composition
Theorems
for Post-Quantum NTT Masking
🔢
Homomorphic Encryption
arxiv.org
·
1d
Practical Post-Quantum Secure
Publicly
Verifiable
Secret Sharing and Applications
🔢
Homomorphic Encryption
eprint.iacr.org
·
5d
Efficient Quantum Fully
Homomorphic
Encryption
🔢
Homomorphic Encryption
arxiv.org
·
2d
Mosaic
: Practical Malicious Security for
Garbled
Circuits on Bitcoin
⚖️
Consensus Networks
eprint.iacr.org
·
5d
Layer 2 Blockchains Simplified: A Survey of Vector Commitment Schemes,
ZKP
Frameworks, Layer-2 Data Structures and
Verkle
Trees
⚖️
Consensus Networks
arxiv.org
·
6d
A
Stackelberg
Model for
Hybridization
in Cryptography
🔢
Homomorphic Encryption
arxiv.org
·
6d
MCP
Pitfall
Lab:
Exposing
Developer Pitfalls in MCP Tool Server Security under Multi-Vector Attacks
🔓
Binary Exploitation
arxiv.org
·
6d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help