Sorting encrypted data without decryption: a practical trick
dev.to·3h·
Discuss: DEV
🔐Hash Functions
An enough week
blog.mitrichev.ch·23h·
🧮Z3 Solver
Three ways formally verified code can go wrong in practice
buttondown.com·1h
📜Proof Carrying Code
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.org·15h
📐Compression Bounds
How to store ordered information in a Relational Database (2015)
softwareengineering.stackexchange.com·1d·
🧮Algebraic Datatypes
Modern C and initializing an array
subethasoftware.com·1d
🗂Data structures
I Replaced My Toaster's Firmware and Now I'm a Fugitive
jxself.org·4h
🔓Hacking
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·9h
💎Information Crystallography
CodeSOD: A JSON Serializer
thedailywtf.com·1d
📦Deflate
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.dev·1d·
Discuss: Hacker News
🔐Hash Functions
No Bullshit Guide to Statistics prerelease
minireference.com·1h
🧮Kolmogorov Bounds
Basketball trivia, editing distances, and derangement
leancrew.com·1d
🌳Trie Structures
The Dwarves Beneath the Kernel: Forging BTF for eBPF
bootlin.com·2d
📺VT100
APRS over LoRa with RNode | unsigned.io
unsigned.io·8h
📻Homebrew Protocols
Cactus Language • Semantics 3
inquiryintoinquiry.com·3h
🔢Denotational Semantics
Writing regex is pure joy. You can't convince me otherwise.
triangulatedexistence.mataroa.blog·17h·
Format Verification
How JPEG Works: The Subtle Beauty and Art of Imperfection
techspot.com·1d
🖼️JPEG XL
Who Invented the Johnson Decade Counter (and Why)?
eejournal.com·1d·
Discuss: Hacker News
Homebrew CPUs
Let’s Make a Tic-Tac-Deal!
thefiddler.substack.com·7h·
Discuss: Substack
🎯Proof Tactics