Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
馃 Verifiable Credentials
VCs, DIDs, W3C verifiable credentials, decentralized identifiers
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
2109
posts in
27.9
ms
Source Known
Identifiers
: A
Three-Tier
Identity System for Distributed Applications
聽
馃幁
Anonymous Credentials
arxiv.org
路
6d
Verification Facade:
Masquerading
Insecure Cryptographic
Implementations
as Verified Code
聽
馃攼
Post-Quantum Crypto
eprint.iacr.org
路
2d
Signature Placement in Post-Quantum TLS Certificate
Hierarchies
: An Experimental Study of ML-DSA and
SLH-DSA
in TLS 1.3 Authentication
聽
馃攼
Post-Quantum Crypto
arxiv.org
路
23h
An Efficient Identity-Based Blind
Signature
Scheme from
SM9
聽
鉁嶏笍
Threshold Signatures
eprint.iacr.org
路
1d
Verifiable
Divide-and-Conquer
聽
馃敡
Constraint Solvers
eprint.iacr.org
路
3d
Merkle Tree Certificate Post-Quantum
PKI
for Kubernetes and Cloud-Native
5G/B5G
Core
聽
馃攼
Post-Quantum Crypto
arxiv.org
路
1d
VEIL
: Lightweight Zero-Knowledge for Hash-Based
Multilinear
Proof Systems
聽
馃攼
Zero-knowledge
eprint.iacr.org
路
1d
Batch Verification of
Modified
ECDSA
Signatures
聽
鉁嶏笍
Threshold Signatures
eprint.iacr.org
路
3d
A
Faceted
Classification of
Authenticator-Centric
Authentication Techniques
聽
馃攽
Functional Encryption
arxiv.org
路
1d
Vault
: Decentralized Storage Made
Durable
聽
馃寪
Distributed Consensus
arxiv.org
路
1d
Random
Robust Secret
Sharing
with Perfect Privacy and its Applications
聽
馃攼
Zero-knowledge
eprint.iacr.org
路
5d
Safety and
Liveness
of Cross-Domain State Preservation under Byzantine Faults: A
Mechanized
Proof in Isabelle/HOL
聽
馃寪
Distributed Consensus
arxiv.org
路
1d
Toward Provable Security in
Anamorphic
Extension: New
Constructions
and Analysis
聽
馃攽
Functional Encryption
eprint.iacr.org
路
6d
Search-Bound
Proximity
Proofs
: Binding Encrypted Geographic Search to Zero-Knowledge Verification
聽
馃攼
Zero-knowledge
arxiv.org
路
1d
Compressed Key Exchange Protocol from
Orientations
of Large
Discriminant
Using AVX-512
聽
#锔忊儯
BLAKE3
eprint.iacr.org
路
1d
Ordered
Multi-Signatures
from the DL
Assumption
聽
鉁嶏笍
Threshold Signatures
eprint.iacr.org
路
6d
Trustless
Provenance Trees: A Game-Theoretic Framework for Operator-Gated Blockchain
Registries
聽
#锔忊儯
BLAKE3
arxiv.org
路
1d
HDP
: A Lightweight Cryptographic Protocol for Human Delegation
Provenance
in Agentic AI Systems
聽
馃攼
Zero-knowledge
arxiv.org
路
1d
Design and
Implementation
of an Open-Source Security Framework for Cloud Infrastructure
聽
馃攽
Cryptography
arxiv.org
路
1d
ContractShield
: Bridging Semantic-Structural Gaps via Hierarchical Cross-Modal Fusion for Multi-Label Vulnerability Detection in
Obfuscated
Smart Contracts
聽
馃攼
OPAQUE
arxiv.org
路
2d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help