An enough week
blog.mitrichev.ch·23h·
🧮Z3 Solver
Sorting encrypted data without decryption: a practical trick
dev.to·3h·
Discuss: DEV
🔐Hash Functions
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.org·19h·
Discuss: Hacker News
🔢Reed-Solomon Math
The Bit Shift Paradox: How "Optimizing" Can Make Code 6× Slower
hackernoon.com·2d
🧮Compute Optimization
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·9h
💎Information Crystallography
Randomized and quantum approximate matrix multiplication
arxiv.org·15h
🔐Quantum Cryptography
Parallelizing Cellular Automata with WebGPU Compute Shaders
vectrx.substack.com·9h·
Discuss: Substack
🔲Cellular Automata
BYOVD to the next level (part 2) — rootkit like it's 2025
blog.quarkslab.com·1d
🔍eBPF
Three ways formally verified code can go wrong in practice
buttondown.com·1h
📜Proof Carrying Code
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.dev·1d·
Discuss: Hacker News
🔐Hash Functions
PCBs and parts are on hand - beginning construction of new 1130MRAM board
rescue1130.blogspot.com·21h·
⚙️DIY Electronics
Linux SBCs for development + RE
zetier.com·1d
🎯Emulator Accuracy
How to store ordered information in a Relational Database (2015)
softwareengineering.stackexchange.com·1d·
🧮Algebraic Datatypes
Enhanced SoC Design via Adaptive Topology Optimization with Reinforcement Learning
dev.to·16h·
Discuss: DEV
🧩RISC-V
Trusted Execution Environments? More Like "Trust Us, Bro" Environments
libroot.org·54m·
Discuss: Hacker News
🛡️RISC-V Security
Cryptography for the Everyday Developer: Number Theory for Public Key Cryptography
sookocheff.com·3d
🔢Reed-Solomon Math
Efficient and accurate search in petabase-scale sequence repositories
nature.com·2d·
Discuss: Hacker News
🔄Burrows-Wheeler
Metasploit Wrap Up 10/09/2025
rapid7.com·22h
🛡️eBPF Security
Three Solutions to Nondeterminism in AI
blog.hellas.ai·2d·
Discuss: Hacker News
🎯Performance Proofs