Sorting encrypted data without decryption: a practical trick
dev.to·8h·
Discuss: DEV
🔐Hash Functions
An enough week
blog.mitrichev.ch·1d·
🧮Z3 Solver
Three ways formally verified code can go wrong in practice
buttondown.com·6h
📜Proof Carrying Code
BQN "Macros" with •Decompose (2023)
saltysylvi.github.io·1h·
Discuss: Hacker News
🦀Rust Macros
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.org·19h
📐Compression Bounds
I Replaced My Toaster's Firmware and Now I'm a Fugitive
jxself.org·8h
🔓Hacking
Modern C and initializing an array
subethasoftware.com·1d
🗂Data structures
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·13h
💎Information Crystallography
CodeSOD: A JSON Serializer
thedailywtf.com·1d
📦Deflate
How to store ordered information in a Relational Database (2015)
softwareengineering.stackexchange.com·1d·
🧮Algebraic Datatypes
Basketball trivia, editing distances, and derangement
leancrew.com·2d
🌳Trie Structures
The Dwarves Beneath the Kernel: Forging BTF for eBPF
bootlin.com·2d
📺VT100
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.dev·1d·
Discuss: Hacker News
🔐Hash Functions
APRS over LoRa with RNode | unsigned.io
unsigned.io·12h
📻Homebrew Protocols
Writing regex is pure joy. You can't convince me otherwise.
triangulatedexistence.mataroa.blog·21h·
Format Verification
Let’s Make a Tic-Tac-Deal!
thefiddler.substack.com·11h·
Discuss: Substack
🎯Proof Tactics
Who Invented the Johnson Decade Counter (and Why)?
eejournal.com·2d·
Discuss: Hacker News
Homebrew CPUs
Cactus Language • Semantics 3
inquiryintoinquiry.com·7h
🔢Denotational Semantics
PCBs and parts are on hand - beginning construction of new 1130MRAM board
rescue1130.blogspot.com·1d·
⚙️DIY Electronics