Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Zero-Knowledge Proofs
Specific
ZK, Privacy, Cryptography, zkSNARK
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
145919
posts in
21.7
ms
VEIL
: Lightweight Zero-Knowledge for Hash-Based
Multilinear
Proof Systems
🚫
Zero Trust
eprint.iacr.org
·
1d
Proof
Projectors
🚫
Zero Trust
blog.voboda.com
·
4d
Post-Quantum
BIP-86
Recovery via
zk-STARK
Proof of
BIP-32
Seed Knowledge
₿
Crypto
groups.google.com
·
19h
Towards
Privacy-Preserving
Large Language Model: Text-free Inference Through
Alignment
and Adaptation
🤖
LLM
arxiv.org
·
10h
A
Cryptography
Engineer’s Perspective on Quantum Computing
Timelines
👥
P2P Networks
words.filippo.io
·
2d
·
Lobsters
,
Hacker News
,
r/crypto
The
Visible
Key
🔒
Digital Privacy
aperceptualdrifter.substack.com
·
4d
·
Substack
The
Joy
Of
Cryptography
(MIT Press)
🔒
Digital Privacy
i-programmer.info
·
2d
Advanced
Compact
Patterns for
Web3
Developers
💾
Local-First
docs.midnight.network
·
6d
·
DEV
How Quantum Computing
Affects
Cryptography
🚫
Zero Trust
thequantuminsider.com
·
3d
Tape Street – Adaptive Encryption via
Kinetic
Cryptography
👥
P2P Networks
github.com
·
3d
·
Hacker News
On the Price of Privacy for Language
Identification
and Generation
🔏
Privacy
arxiv.org
·
10h
FLOSS
: Fast Linear Online Secret-Shared
Shuffling
🔒
Privacy Tools
eprint.iacr.org
·
2d
ConfusionPrompt
:
Practical
Private Inference for Online Large Language Models
🤖
LLM
arxiv.org
·
10h
On the Computational Complexity of
Geometrically
Local
QAC0
circuits
🎲
Game Theory
arxiv.org
·
10h
Random
Robust Secret
Sharing
with Perfect Privacy and its Applications
🚫
Zero Trust
eprint.iacr.org
·
6d
Digital Privacy in
IoT
: Exploring Challenges,
Approaches
and Open Issues
🔒
Digital Privacy
arxiv.org
·
2d
Say Something Else: Rethinking
Contextual
Privacy as Information
Sufficiency
🔒
Digital Privacy
arxiv.org
·
10h
Which Privacy
Blanket
is Optimal in the
Shuffle
Model?
🔒
Digital Privacy
eprint.iacr.org
·
3d
Equivalence
Testing Under Privacy
Constraints
🔒
Digital Privacy
arxiv.org
·
10h
BodhiPromptShield
: Pre-Inference Prompt Mediation for
Suppressing
Privacy Propagation in LLM/VLM Agents
✍️
Prompt Engineering
arxiv.org
·
1d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help