10000
jro.sg·18h
📦Executable Size
Flag this post
Unlocking Speed: Certified Symmetry Breaking with Auxiliary Variables
🧮Combinator Calculus
Flag this post
A forthcoming problem with bitvm - Supertestnet interrogates Citrea's protocol
telegra.ph·1d
📡Binary Protocols
Flag this post
Making SLH-DSA 10x-100x Faster
conduition.io·6h
🔗Hash Algorithms
Flag this post
<p>**Abstract:** This paper introduces a novel approach to constructing minimal polynomials for matrices within numerical linear algebra using reinforcement lea...
freederia.com·23h
🧩Constraint Solvers
Flag this post
Playing with cryptography
voboda.bearblog.dev·1d
🔗Hash Functions
Flag this post
The Easiest Way to Build a Type Checker
✅Type Checking
Flag this post
Recipe 8.6. Picking a Random Line from a File (Perl Cookbook)
csg.sph.umich.edu·12h
📝Rope Editors
Flag this post
Refined Linear Approximations for ARX Ciphers and Their Application to ChaCha
eprint.iacr.org·1d
🔗Hash Functions
Flag this post
Evolution Strategies at the Hyperscale
💬Interactive REPLs
Flag this post
Pitch Multiplication (2017)
🔶Lattice Theory
Flag this post
Weekly Bookmarks
inkdroid.org·1h
🪢Rope Data Structures
Flag this post
Perennial Technical Reading List
📱Bytecode Design
Flag this post
Nearly $19M Raised Before V1 Protocol Launch, This New Crypto May Be The Safest 2026 Investment
hackernoon.com·10h
🛡️Parser Security
Flag this post
Loading...Loading more...