Confidentiality in a Card-Based Protocol Under Repeated Biased Shuffles
arxiv.org·22h
🦀Rust
Flag this post
The Myth of RAM (2014)
🦀Rust
Flag this post
The Underwear Fixed Point
🦀Rust
Flag this post
Modern perspectives in proof theory (2023)
🦀Rust
Flag this post
Imperative to Relational
🦀Rust
Flag this post
A fault-tolerant neutral-atom architecture for universal quantum computation
nature.com·10h
🦀Rust
Flag this post
n-ary Huffman coding
lesswrong.com·1d
🦀Rust
Flag this post
Simplex-FEM Networks (SiFEN): Learning A Triangulated Function Approximator
arxiv.org·22h
🦀Rust
Flag this post
Test and Measurement Strategies for QKD, PQC and Hybrid Systems
eetimes.com·4h
🍳cooking
Flag this post
Explorations of RDMA in LLM Systems
🦀Rust
Flag this post
Loading...Loading more...