Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔑 Cryptography
protocols, encryption, cs.CR, applied crypto
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
2109
posts in
31.1
ms
Explainable
PQC
: A Layered
Interpretive
Framework for Post-Quantum Cryptographic Security Assumptions
🔐
Post-Quantum Crypto
arxiv.org
·
1d
On Optimal
Information-Theoretic
Security in
Symmetric
Encryption under Low-Entropy Keys
🔐
Post-Quantum Crypto
eprint.iacr.org
·
6d
A Formal Security Framework for MCP-Based AI Agents: Threat
Taxonomy
, Verification Models, and Defense
Mechanisms
#️⃣
BLAKE3
arxiv.org
·
21h
Compressed Key Exchange Protocol from
Orientations
of Large
Discriminant
Using AVX-512
#️⃣
BLAKE3
eprint.iacr.org
·
1d
Toward Provable Security in
Anamorphic
Extension: New
Constructions
and Analysis
🔑
Functional Encryption
eprint.iacr.org
·
6d
Safety and
Liveness
of Cross-Domain State Preservation under Byzantine Faults: A
Mechanized
Proof in Isabelle/HOL
🌐
Distributed Consensus
arxiv.org
·
1d
Verification Facade:
Masquerading
Insecure Cryptographic
Implementations
as Verified Code
🔐
Post-Quantum Crypto
eprint.iacr.org
·
2d
On the Necessity of Pre-agreed Secrets for
Thwarting
Last-minute Coercion: Vulnerabilities and Lessons From the
Loki
E-voting Protocol
🔑
Functional Encryption
arxiv.org
·
6d
VEIL
: Lightweight Zero-Knowledge for Hash-Based
Multilinear
Proof Systems
🔐
Zero-knowledge
eprint.iacr.org
·
1d
Design and
Implementation
of an Open-Source Security Framework for Cloud Infrastructure
#️⃣
BLAKE3
arxiv.org
·
1d
Signature Placement in Post-Quantum TLS Certificate
Hierarchies
: An Experimental Study of ML-DSA and
SLH-DSA
in TLS 1.3 Authentication
🔐
Post-Quantum Crypto
eprint.iacr.org
·
3d
Context-Binding Gaps in
Stateful
Zero-Knowledge
Proximity
Proofs: Taxonomy, Separation, and Mitigation
🔐
Zero-knowledge
arxiv.org
·
1d
Ordered
Multi-Signatures
from the DL
Assumption
✍️
Threshold Signatures
eprint.iacr.org
·
6d
Digital Privacy in
IoT
: Exploring Challenges,
Approaches
and Open Issues
🛡️
Privacy-by-Design
arxiv.org
·
1d
Fast and Efficient
Perfectly
Secure
Network-Agnostic
Secure Computation
🔐
Zero-knowledge
eprint.iacr.org
·
5d
Search-Bound
Proximity
Proofs
: Binding Encrypted Geographic Search to Zero-Knowledge Verification
🔐
Zero-knowledge
arxiv.org
·
1d
Applications of
Bruhat-Chevalley-Renner
Decomposition to Metric-Aware Code-Based Cryptography
#️⃣
BLAKE3
eprint.iacr.org
·
3d
Merkle Tree Certificate Post-Quantum
PKI
for Kubernetes and Cloud-Native
5G/B5G
Core
🔐
Post-Quantum Crypto
arxiv.org
·
1d
TraceGuard
: Structured Multi-Dimensional Monitoring as a
Collusion-Resistant
Control Protocol
🌐
Distributed Consensus
arxiv.org
·
1d
A
Faceted
Classification of
Authenticator-Centric
Authentication Techniques
🔑
Functional Encryption
arxiv.org
·
1d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help