Build Your Own Key-Value Storage Engine—Week 6
read.thecoder.cafe·15h
Free papers, get your free papers here!
esat.kuleuven.be·8h
understanding LSM trees via read, write, and space amplification
bitsxpages.com·5h
CoSMeTIC: Zero-Knowledge Computational Sparse Merkle Trees with Inclusion-Exclusion Proofs for Clinical Research
arxiv.org·23h
Diffie-Hellman Key Exchange
denvaar.dev·1d
How Static Analysis Can Expose Personal Data Hidden in Source Code
hackernoon.com·16h
Values of the world, unite!
jemarch.net·1d
Digital hygiene
karpathy.bearblog.dev·6h
A Novel Side-channel Attack That Utilizes Memory Re-orderings (U. of Washington, Duke, UCSC et al.)
semiengineering.com·9h
Loading...Loading more...