A diffusion-based multi-modal anomaly detection approach for data communication in TACS
sciencedirect.com·4h
🦀Rust
Flag this post
New Asymptotic Results on Predicting Non-linear Polynomial Congruential Generators
eprint.iacr.org·3d
⚗️Elixir
Flag this post
How to handle secrets on the command line
⚗️Elixir
Flag this post
Linux To Gain ML-DSA/Dilithium Post-Quantum Cryptography For Module Signing
phoronix.com·1d
⚗️Elixir
Flag this post
Seeking Advice: Tamper-Proofing a Memory Chip for Secure Delivery to a Paired Device (Embedded Authentication)
🦀Rust
Flag this post
Thoughts on Building Reliable Systems
🦀Rust
Flag this post
A Monad Guide for Beginners
🧩Category Theory
Flag this post
I logged all the HTTP requests that hit my new web server
lenny.bearblog.dev·3h
⚗️Elixir
Flag this post
Even Numbers Are Tautologies
🧩Category Theory
Flag this post
Agent Foundations: Paradigmatizing in Math and Science
lesswrong.com·1d
🧩Category Theory
Flag this post
Loading...Loading more...