🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔢 Bitwise Algorithms

Bit Manipulation, Population Count, Bit Hacks, Hardware Optimization

Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.org·1d
🔐Homomorphic Encryption
C++ Seeding Surprises (2015)
pcg-random.org·30m·
Discuss: Hacker News
🧬Bitstream Evolution
🧠 Solving LeetCode Until I Become Top 1% — Day `30`
dev.to·8h·
Discuss: DEV
📐Error Bounds
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·7h
🎫Kerberos Attacks
Bitmasking for Granular Backend RBAC: A Beginner's Guide
dev.to·3h·
Discuss: DEV
🔐Homomorphic Encryption
Why Binary Won and Nothing Else Even Got Close
b0a04gl.site·21h·
Discuss: Hacker News
🧲RISC-V Archaeology
Diving deep into Binius M3 arithmetization using Merkle tree inclusion as an example
blog.lambdaclass.com·1d
🌳Archive Merkle Trees
Smart amplifier cuts power consumption, paving way for more qubits and less decoherence
phys.org·42m
⚛️Quantum Tape
The one-more-re-nightmare compiler (2021)
applied-langua.ge·1d·
Discuss: Lobsters, r/programming
🔍RegEx Engines
Worth Reading 062425
rule11.tech·1h
🌐DNS over QUIC
Double Maths First Thing: Issue 2A
aperiodical.com·8h
👑Isabelle
4-input 2-output Boolean circuits (2020)
cp4space.hatsya.com·1d·
Discuss: Hacker News
⚙️Logic Synthesis
Meet Mojo: The Language That Could Replace Python, C++, and CUDA
hackernoon.com·9h
⬆️Lambda Lifting
Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.com·8h
🦠Malware Analysis
Small language model for secrets detection
wiz.io·2d·
Discuss: Hacker News
💻Local LLMs
How much slower is random access, really?
samestep.com·2d·
Discuss: Hacker News
📼Tape Encoding
Superimposed codes
blog.sesse.net·3d
💾Binary codes
Machine Learning Fundamentals: accuracy with python
dev.to·1d·
Discuss: DEV
👁️Observatory Systems
PicoEMP: low-cost Electromagnetic Fault Injection (EMFI) tool
github.com·13h·
Discuss: Hacker News
⚡Circuit Archaeology
Encrypting identifiers in practice
sjoerdlangkemper.nl·11h
🌊Stream Ciphers
Loading...Loading more...
AboutBlogChangelogRoadmap