🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔢 Bitwise Algorithms

Bit Manipulation, Population Count, Bit Hacks, Hardware Optimization

TaMaRa: Towards a Triple Modular Redundancy Pass for Yosys
blog.yosyshq.com·1d·
Discuss: Lobsters, Hacker News
🔍FPGA Verification
Sets & Heaps in Haskell and Rust
mmhaskell.com·11h
🔒Type Safety
Exhaustive Generation of Pattern-Avoiding s-Words
arxiv.org·16h
💾Binary Linguistics
It takes 26 yottabytes of RAM to typecheck a union of Safe Integers
playfulprogramming.com·20h
🧪Binary Fuzzing
FLINT: Fast Library for Number Theory
flintlib.org·1h
🧮Algebraic Datatypes
noble-curves: audited and minimal elliptic curve cryptography in JavaScript
github.com·1h·
Discuss: Hacker News
🔱Galois Cryptography
Bmssp: A New Shortest Path Algorithm
rohanparanjpe.substack.com·1h·
Discuss: Substack
🔗Topological Sorting
A Fast Bytecode VM for Arithmetic: The Compiler
abhinavsarkar.net·1d·
Discuss: Lobsters, Hacker News
🔗Functional Compilers
Linear scan with lifetime holes
bernsteinbear.com·1d·
Discuss: Lobsters, Hacker News
🚀Compiler Optimizations
16-Bit Fast Inverse Square Root
ashdnazg.github.io·1d·
Discuss: Hacker News
📐Interval Arithmetic
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.com·11h
🔐Quantum Security
A Bitcoin Core Code Analysis
binaryigor.com·4h·
Discuss: Hacker News
🧬Bitstream Evolution
International Conference on Enumerative Combinatorics and Applications ICECA 2025 (August 25-27, 2025)
gilkalai.wordpress.com·1d
🔗Combinatory Logic
How Many Paths of Length K Are There Between a and B?
horace.io·1d·
Discuss: Hacker News
🕸️Graph Algorithms
Computer Architecture Lessons from the Kitchen
sigarch.org·6h
🧮Algorithmic Cooking
Claude Code's 19 cent Parser
blogger.com·7h
🔧Binary Parsers
OpenBSD Hackathon Leipzig 2025: Qt6 Fixes, KDE PIM, and C++26 Updates
discoverbsd.com·12h
🔍eBPF
Go’s unsafe: Unlocking Performance Hacks with a Risk
dev.to·4h·
Discuss: DEV
🔒Type Safety
Show HN: DataCompose – Prevent downstream data failures with composite functions
datacompose.io·22m·
Discuss: Hacker News
✅Format Validation
The MiniPC Revolution
jadarma.github.io·3h·
Discuss: Hacker News
🖥️Modern Terminals
Loading...Loading more...
AboutBlogChangelogRoadmap