The Transformer and the Hash
lesswrong.com·4h
🌳Merkle Trees
Flag this post
One Weird Hashing Trick
🧮Vector Databases
Flag this post
Space-Efficient and Output-Sensitive Algorithms for the Longest Common Bitonic Subsequence
arxiv.org·20h
🎯Van Emde Boas Trees
Flag this post
Biometric Key Derivation for Decentralized Identity Using Fuzzy Extractors
🔢Homomorphic Encryption
Flag this post
Python Security Guide: Password Hashing, Encryption, Digital Signatures, and Secure Coding Practices
🔐Cryptography
Flag this post
What Is Graph Anomaly Detection
🕸️Graph Databases
Flag this post
How to store passwords in your database
#️⃣Hash Tables
Flag this post
Explaining Financial Models by Deleting Transactions
building.nubank.com·1d
💰TigerBeetle
Flag this post
LLMs Are Randomized Algorithms
towardsdatascience.com·8h
🔀Procedural Generation
Flag this post
🧠 Understanding Ransomware and Malware: How Cybercriminals Lock and Exploit Your Data
🦠Malware Analysis
Flag this post
First-class custom smart pointers
🔀Crossbeam
Flag this post
Loading...Loading more...