Understanding RS256: A Deep Dive into Asymmetric Encryption
dev.toยท1dยท
Discuss: DEV
๐Ÿ”—Hash Algorithms
Indexing, Hashing, and Query
dev.toยท11hยท
Discuss: DEV
๐Ÿ”—Hash Algorithms
Fun with HyperLogLog and SIMD
vaktibabat.github.ioยท1dยท
๐Ÿ”ขBit Manipulation
Building a HashMap in Rust - Part 1: What's a Hashmap?
cglab.caยท5d
๐Ÿ”—Hash Algorithms
Using Palm Jumeirah's Design to Visualize the Elliptic Curve Method
codingpirate.comยท6hยท
Discuss: Hacker News
๐Ÿ”ขAlgebraic Datatypes
I started using VeraCrypt to protect my files and I should have sooner
makeuseof.comยท17h
๐Ÿ›ก๏ธSecurity Type Systems
Fundamentals metrics for Software Engineering derived from Math Statistics
dev.toยท11hยท
Discuss: DEV
๐Ÿ”ขAlgebraic Datatypes
Highly concurrent in-memory counter in GoLang
engineering.grab.comยท5h
๐Ÿง Memory Models
Plugin Secure
rya.ncยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธParser Security
Cuckoo hashing improves SIMD hash tables
reiner.orgยท1dยท
๐Ÿ—๏ธHash Tables
The math Module in Python: 6 Common Calculations You Can Make
howtogeek.comยท13h
๐Ÿ“Mathematical Computing
The Making of Digital Identity โ€“ The Birth of Digital Authentication
syntheticauth.aiยท13hยท
Discuss: Hacker News
๐Ÿ›ก๏ธCapability Security
Using Information Entropy To Make Choices / Choose Experiments
blog.demofox.orgยท1h
โš–๏ธInference Rules
A content defined chunking algorithm testbed
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”„Deduplication
INDEXING - HASHING - AND -QUERY
dev.toยท2hยท
Discuss: DEV
๐ŸŒธBloom Indexing
Puzzles Games
arkansasonline.comยท1d
๐ŸงฉSAT Solvers
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.comยท10hยท
Discuss: Hacker News
๐Ÿ›ก๏ธStack Safety
SoK: Kicking CAN Down the Road. Systematizing CAN Security Knowledge
arxiv.orgยท1h
๐Ÿ›ก๏ธSecurity Type Systems
XiangShan Vector Floating-Point Unit Design
docs.xiangshan.ccยท1dยท
Discuss: Hacker News
๐ŸŽฏBit Vectors