Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Post-Quantum Crypto
PQC, NIST, Kyber, Dilithium, post-quantum cryptography
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
2781
posts in
44.9
ms
Explainable
PQC
: A Layered
Interpretive
Framework for Post-Quantum Cryptographic Security Assumptions
🔑
Cryptography
arxiv.org
·
3d
QED-Lite
: Lightweight Detection of Quantum-Vulnerable ELF
Binaries
via Cryptographic Library Version Fingerprinting
#️⃣
BLAKE3
eprint.iacr.org
·
5d
PQC-Enhanced
QKD
Networks: A Layered Approach
📡
media over QUIC
arxiv.org
·
2d
Evaluating PQC
KEMs
,
Combiners
, and Cascade Encryption via Adaptive IND-CPA Testing Using Deep Learning
🔐
Zero-knowledge
arxiv.org
·
1d
Improved Codes and
Decoders
for
HQC
#️⃣
BLAKE3
eprint.iacr.org
·
6d
Zero Trust in the Context of
IoT
: Industrial
Literature
Review, Trends, and Challenges
🔐
Zero-knowledge
arxiv.org
·
1d
Uncertainty Propagation in Stochastic Hybrid Systems with
Dimension-Varying
Resets
🔣
Type Systems
arxiv.org
·
1d
Finite-Step
Invariant
Sets for Hybrid Systems with
Probabilistic
Guarantees
🔧
Constraint Solvers
arxiv.org
·
2d
Signature Placement in Post-Quantum TLS Certificate
Hierarchies
: An Experimental Study of ML-DSA and
SLH-DSA
in TLS 1.3 Authentication
✍️
Threshold Signatures
eprint.iacr.org
·
4d
Towards the Development of an LLM-Based
Methodology
for Automated Security
Profiling
in Compliance with Ukrainian Cybersecurity Regulations
🔌
LSP
arxiv.org
·
1d
Chatbot-Based
Assessment
of Code Understanding in Automated Programming
Assessment
Systems
🔌
LSP
arxiv.org
·
1d
Verification Facade:
Masquerading
Insecure Cryptographic
Implementations
as Verified Code
#️⃣
BLAKE3
eprint.iacr.org
·
3d
Hybrid Systems as
Coalgebras
: Lyapunov
Morphisms
for Zeno Stability
🔣
Type Systems
arxiv.org
·
2d
Differentiable
Invariant Sets for Hybrid Limit Cycles with Application to
Legged
Robots
🔧
Constraint Solvers
arxiv.org
·
2d
From Governance
Norms
to
Enforceable
Controls: A Layered Translation Method for Runtime Guardrails in Agentic AI
🗳️
Quorum Systems
arxiv.org
·
2d
Post-Quantum
Cryptographic
Analysis of Message
Transformations
Across the Network Stack
🔑
Cryptography
arxiv.org
·
13h
MEV-ACE
: Identity-Authenticated Fair Ordering for
Proposer-Controlled
MEV
Mitigation
🔄
CRDT
arxiv.org
·
13h
The
Quantum-Cryptographic
Co-evolution
🔐
Zero-knowledge
arxiv.org
·
4d
Partial Number
Theoretic
Transform
Masking
in Post Quantum Cryptography Hardware: A Security Margin Analysis
🔐
Zero-knowledge
arxiv.org
·
3d
Broken Quantum: A
Systematic
Formal
Verification Study of Security Vulnerabilities Across the Open-Source Quantum Computing Simulator Ecosystem
📋
Lightweight Formal Methods
arxiv.org
·
1d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help