Rendezvous Hashing Explained (2020)
randorithms.comยท21hยท
๐Ÿ”—Hash Algorithms
Provable Cryptography for Bitcoin: An Introduction (Workbook)
delvingbitcoin.orgยท3h
๐Ÿ“กBinary Protocols
StringWa.rs on GPUs: Databases & Bioinformatics ๐Ÿฆ 
ashvardanian.comยท22hยท
๐Ÿš€Tokenizer Performance
Why You Need to Know How a Database Works Internally?
dev.toยท1dยท
Discuss: DEV
๐Ÿ—„๏ธDatabase Engines
Moneroโ€™s seed phrase words
johndcook.comยท6hยท
Discuss: Hacker News
๐Ÿ”ขBit Manipulation
HTB Planning Machine Walkthrough | Easy HackTheBox Guide for Beginners
infosecwriteups.comยท7h
๐Ÿ’ปTerminal Control
Rowhammer: TRR on DDR5 DRAM has been broken
comsec.ethz.chยท1dยท
๐Ÿท๏ธMemory Tagging
Power Query Secret Tip to Lightning-Fast Approximate Matches
geeky-gadgets.comยท1d
๐Ÿ“ŠQuery Optimizers
Tech Tuesday: Password Security - DailyRidge.com
dailyridge.comยท9h
๐Ÿ”—Hash Functions
PDF_Expert_3.10.20_atb.dmg
xmac.appยท59m
๐Ÿ”„Deduplication
A Slotted Hash Cons for Alpha Invariance
philipzucker.comยท23hยท
Discuss: Hacker News
๐Ÿ”—Lexical Scoping
How to Wrap Five Eggs / Frostgrave
kk.orgยท1h
๐Ÿ—‘๏ธStack Scanning GC
[NodeBook] Understanding Buffers in Node.js - Why they exist, where they live in memory, and how they handle binary data
thenodebook.comยท1dยท
Discuss: r/node
๐Ÿ”ขBinary Formats
MAUI: Reconstructing Private Client Data in Federated Transfer Learning
arxiv.orgยท13h
๐Ÿ”Lens Libraries
What is Multi-Party Computation?
privacyguides.orgยท23h
๐ŸŽฏRing Buffers
MostereRAT Malware Leverages Evasion Tactics to Foil Defenders
blogger.comยท2h
๐Ÿ›ก๏ธParser Security
Semantic Dictionary Encoding
falvotech.comยท1dยท
Discuss: Hacker News
๐Ÿ—‚๏ธType Indexing
Linkage
11011110.github.ioยท1d
๐ŸงฎCombinator Calculus
FreeBSD Errata Notice FreeBSD-EN-25:15.arm64
bsdsec.netยท24m
๐Ÿท๏ธMemory Tagging
Two Axes, Four Patterns: How Teams Actually Do GPU Binpack/Spread on K8s (w/ DRA context)
reddit.comยท1dยท
Discuss: r/kubernetes
๐Ÿ—๏ธCustom Allocators