🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Post-Quantum Cryptography

Lattice Cryptography, NIST Standards, Migration Strategies, Key Exchange

The Coming Wave: Post-Quantum Cryptography and the Future of Cybersecurity
blog.publiccomps.comΒ·4dΒ·
Discuss: Hacker News
πŸ”’Security Engineering
We can still sleep peacefully β€” or so we thought. Steganography via internal activations is already possible in small language models β€” a potential first step t...
lesswrong.comΒ·7h
πŸ•ΈοΈWASM
IBM and Moderna have simulated the longest mRNA pattern without AI β€” they used a quantum computer instead
livescience.comΒ·6hΒ·
Discuss: Hacker News
πŸ€–AI
Parametric Matrix Models
nature.comΒ·2dΒ·
Discuss: Hacker News
πŸ‘οΈObservability
Making of SARE: Master Seeds in Hybrid Post-Quantum Encryption
zola.inkΒ·4dΒ·
Discuss: Hacker News
πŸ”’Security Engineering
Mathematicians credited with rescuing quantum computing
today.usc.eduΒ·1dΒ·
Discuss: Hacker News
πŸ’»Programming
Navigating the EU’s new Radio Equipment Directive: how Raspberry Pi provides an industrial advantage
raspberrypi.comΒ·1d
πŸ›οΈTechnical Architecture
The Future of Quantum Key Distribution and Global Secure Communications
luciuswayne.comΒ·5dΒ·
Discuss: Hacker News
πŸ”’Security Engineering
Encryption made for police and military radios may be easily cracked
arstechnica.comΒ·7hΒ·
Discuss: r/privacy
πŸ”’Security Engineering
Implementing Secure Authentication: Practical Tactics for Digital Identity Defense
guptadeepak.comΒ·1dΒ·
Discuss: DEV, Hacker News
πŸ”’Security Engineering
Philosophy of Information
plato.stanford.eduΒ·1dΒ·
Discuss: Hacker News
πŸ”’Security Engineering
My blog on zero-knowledge cryptography
kaw101010.github.ioΒ·2dΒ·
Discuss: Hacker News
πŸ”ŒAPI Design
A Full-Chain Exploit of an Unfused Qualcomm Device
hhj4ck.github.ioΒ·1dΒ·
Discuss: Lobsters, Hacker News
πŸ›οΈTechnical Architecture
Exposed to the Bare Bone: When Private Medical Scans Surface on the Internet
modat.ioΒ·1dΒ·
Discuss: Hacker News
πŸ€–AI
Lessons from Using FHE to Build a Secure Consumer App
vishakh.blogΒ·2dΒ·
Discuss: Hacker News
πŸ›οΈTechnical Architecture
Cracking the Vault: How we found zero-day flaws in HashiCorp Vault
cyata.aiΒ·2dΒ·
Discuss: Hacker News, r/programming
πŸ”’Security Engineering
How Confident Are You, ChatGPT?
aylinakkus.github.ioΒ·8hΒ·
Discuss: Hacker News
βš™οΈAI Infrastructure
Distributed Systems 101
mrinalxdev.github.ioΒ·1dΒ·
Discuss: Hacker News
πŸ—οΈSystem Design
High-purity quantum optomechanics at room temperature – Nature Physics
nature.comΒ·2dΒ·
Discuss: Hacker News
πŸ‘οΈObservability
Exploring Traces: Agent trajectory walkthroughs from interesting examples
theori.ioΒ·7hΒ·
Discuss: Hacker News
πŸ¦€Rust Systems
Loading...Loading more...
AboutBlogChangelogRoadmap