Mathematics solves problems by pen and paper. CS helps us to go far beyond that
cacm.acm.org·2d·
Discuss: Hacker News
🧮Homomorphic Encryption
Flag this post
r/mathematics
reddit.com·21h·
Discuss: r/mathematics
🧮Homomorphic Encryption
Flag this post
Setting up Intel TDX VMs with Trustee on OpenShift
developers.redhat.com·3h
🔒Hardware Security
Flag this post
What does the ideal information environment look like?
defenderofthebasic.substack.com·1d·
Discuss: Substack
🤖AI
Flag this post
Show HN: Refusal-Aware Logical Framework for LLMs
github.com·20h·
Discuss: Hacker News
🤖AI
Flag this post
Build your own GPG in Rust
andrewhalle.github.io·1d·
Discuss: Hacker News
🔗Crypto
Flag this post
Low-Level Hacks
blog.raycursive.com·1d·
Discuss: Hacker News
⚙️Programming
Flag this post
Computation as a Game
arxiv.org·1d
🧮Homomorphic Encryption
Flag this post
Extensive FPGA and ASIC resource comparison for blind I/Q imbalance estimators and compensators
sciencedirect.com·20h
🔧MLIR
Flag this post
Uncrossed Multiflows and Applications to Disjoint Paths
arxiv.org·1d
🔄Protocol Design
Flag this post
Growing Threat of npm Supply Chain Attacks and the Runtime Fix That Stops It
riptides.io·1d·
Discuss: r/node
🔒Hardware Security
Flag this post
ShadowLogic: Backdoors in Any Whitebox LLM
arxiv.org·1d
🔒Hardware Security
Flag this post
Microservices? No, modularity is what matters
binaryigor.com·22h·
Discuss: Hacker News
🔧MLIR
Flag this post
Handling Third-Party Access Tokens Securely in AI Agents
auth0.com·1d
🔒Hardware Security
Flag this post
Inferring multiple helper Dafny assertions with LLMs
arxiv.org·1d
🔧MLIR
Flag this post
Fast Answering Pattern-Constrained Reachability Queries with Two-Dimensional Reachability Index
arxiv.org·1d
🔄Protocol Design
Flag this post
GDM: Consistency Training Helps Limit Sycophancy and Jailbreaks in Gemini 2.5 Flash
lesswrong.com·19h
🔒Hardware Security
Flag this post