The Transformer and the Hash
lesswrong.com·50m
🌳Merkle Trees
Flag this post
Space-Efficient and Output-Sensitive Algorithms for the Longest Common Bitonic Subsequence
arxiv.org·16h
🎯Van Emde Boas Trees
Flag this post
One Weird Hashing Trick
🧮Vector Databases
Flag this post
Scaling HNSWs
simonwillison.net·1d
💾Cache Design
Flag this post
Christoph Breitkopf: Interval Tables in Common Lisp
bokesan.blogspot.com·5h
📐Type Theory
Flag this post
Python Security Guide: Password Hashing, Encryption, Digital Signatures, and Secure Coding Practices
🔐Cryptography
Flag this post
When Reverse Proxies Surprise You: Hard Lessons from Operating at Scale
☁️Cloudflare Workers
Flag this post
Scaling HNSWs
#️⃣Hash Tables
Flag this post
Biometric Key Derivation for Decentralized Identity Using Fuzzy Extractors
🔢Homomorphic Encryption
Flag this post
Any-Depth Alignment: Unlocking Innate Safety Alignment of LLMs to Any-Depth
🛡️AI Security
Flag this post
Building a Secure DAL: Composable Multi-Tenancy Filtering with C# and Linq2Db
💧Materialize
Flag this post
First-class custom smart pointers
🔀Crossbeam
Flag this post
Agentic AI Project: Build a Multi-Agent system with LangGraph and Open AI
pub.towardsai.net·1d
🐍Python
Flag this post
Stanford's new Equivariant Encryption enables private AI inference with zero slowdown - works with any symmetric encryption
🔢Homomorphic Encryption
Flag this post
LLMs Are Randomized Algorithms
towardsdatascience.com·4h
🔀Procedural Generation
Flag this post
Drawbot – let's hack something cute
🎛️Microcontrollers
Flag this post
Loading...Loading more...