Hash Collision Probabilities
preshing.comยท4dยท
Discuss: Hacker News
๐Ÿ”—Hash Algorithms
Cryptanalysis and design for a family of plaintext non-delayed chaotic ciphers
arxiv.orgยท5h
๐Ÿ”—Hash Algorithms
Tech Tuesday: Password Security - DailyRidge.com
dailyridge.comยท2h
๐Ÿ”—Hash Algorithms
Rendezvous Hashing Explained (2020)
randorithms.comยท14hยท
๐Ÿ”—Hash Algorithms
StringWa.rs on GPUs: Databases & Bioinformatics ๐Ÿฆ 
ashvardanian.comยท15hยท
๐Ÿš€Tokenizer Performance
[NodeBook] Understanding Buffers in Node.js - Why they exist, where they live in memory, and how they handle binary data
thenodebook.comยท1dยท
Discuss: r/node
๐Ÿ”ขBinary Formats
Model Kombat by HackerRank
producthunt.comยท5h
๐ŸLanguage Benchmarks
[1] Algorithm Showdown: Python vs. JavaScript - Group Anagrams
dev.toยท1dยท
Discuss: DEV
๐ŸชขRope Data Structures
How Blockchain Enables Trust in Digital Transactions
inventorspot.comยท10h
๐Ÿ”—Hash Algorithms
Is IP fragmentation still considered vulnerable?
blog.apnic.netยท8h
๐Ÿ“กProtocol Stacks
A Slotted Hash Cons for Alpha Invariance
philipzucker.comยท15hยท
Discuss: Hacker News
๐Ÿ”—Lexical Scoping
Efficient Polynomial Identity Testing Over Nonassociative Algebras
arxiv.orgยท5h
๐Ÿ”ขAlgebraic Datatypes
Beyond Traditional Pseudorandomness, Tsotchkes' Quantum Random Number Generation
medium.comยท2dยท
Discuss: Hacker News
๐Ÿ“กBinary Protocols
IETF Draft: Authenticated Transfer Repo and Sync Specification
ietf.orgยท23hยท
Discuss: Hacker News
๐Ÿ“กNetwork Serialization
From Theory to the Field: Why Side-Channel Protection Defines Post-Quantum Security
design-reuse.comยท1d
๐ŸฐCapability Machines
The Probability Density Function: A Known Unknown
science20.comยท1d
โœจEffect Inference
Securing and Scaling AI-Powered APIs
capestart.comยท20hยท
Discuss: Hacker News
๐Ÿ›ก๏ธCapability VMs
What is JWT? How do Secret, Public, Private Keys actually work?
jwt.ioยท1dยท
Discuss: DEV
๐ŸŒNetwork Protocols
Bradford Boys win the Bradford XC Invitational - The Bradford Era
bradfordera.comยท7h
๐Ÿlisp