Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Hash Functions, Public Key, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
80108
posts in
842.9
ms
Secrets management with
SOPS
Guix --
fishinthecalculator
fishinthecalculator.me
·
1d
🐧
Linux
Protecting
Digital Assets: The Best Crypto
Wallets
for Long-Term Investors
little-money-matters.blogspot.com
·
1d
💎
Ethereum
High‑Performance Cryptographic Hash Function Based on
Mersenne
Prime Field Arithmetic and Efficient Modular Reduction **Abstract**
Mersenne
primes
\(p=2^q-1\...
freederia.com
·
4d
💎
Ethereum
the
mathematics
of
compression
in database systems
bitsxpages.com
·
14h
💎
Ethereum
Manufacturing
QMS
Software
samrian.com
·
17h
·
Discuss:
Hacker News
🐧
Linux
Nextcloud
with fully
encrypted
storage
justinscholz.de
·
1d
🐧
Linux
From Quantum Threat to AI Exposure: Why Security Is
Converging
Faster Than
Enterprises
Expect
thequantuminsider.com
·
20h
⛓️
Blockchain
Why machine-to-machine
payments
are the new
electricity
for the digital age
finance.yahoo.com
·
1d
⛓️
Blockchain
Fibonacci
numbers and time-space
tradeoffs
johndcook.com
·
1d
⚡
Tokio
Lean
4 and the Curry–Howard
correspondence
wildonblog.wordpress.com
·
14h
⚡
Tokio
A
Unified
Framework for LLM
Watermarks
arxiv.org
·
1d
🛡️
Cybersecurity
Visa Says Cybersecurity
Decides
Who Wins Digital
Commerce
pymnts.com
·
1d
🛡️
Cybersecurity
I built a
cryptographic
memory layer for humans in Python tags: python,
opensource
, security, blockchain
dev.to
·
2d
·
Discuss:
DEV
💎
Ethereum
Scientists Send Secure Quantum Keys Over 62 Miles of
Fiber
—Without
Trusted
Devices
singularityhub.com
·
11h
·
Discuss:
Hacker News
⛓️
Blockchain
Private Data Space Model
privatedata.space
·
5d
💎
Ethereum
Deobfuscation
and Analysis of
Ring-1.io
back.engineering
·
1d
·
Discuss:
Hacker News
🐧
Linux
NEWS
ROUNDUP
digitalforensicsmagazine.com
·
21h
🛡️
Cybersecurity
Jeffrey
Funk
.
Unicorns
, Hype, and Bubbles: A Guide to Spotting, Avoiding, and Exploiting Investment Bubbles in Tech
journals.sagepub.com
·
2d
💎
Ethereum
We have
broken
SHA-1
in practice
shattered.io
·
2d
·
Discuss:
Hacker News
💎
Ethereum
Practical Strategies for
Securing
Web
APIs
in Modern Applications
dev.to
·
21h
·
Discuss:
DEV
🛡️
Cybersecurity
Loading...
Loading more...
« Page 1
•
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help