An enough week
blog.mitrichev.ch·1d·
🧮Z3 Solver
Sorting encrypted data without decryption: a practical trick
dev.to·17h·
Discuss: DEV
🔐Hash Functions
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.org·1d·
Discuss: Hacker News
🔢Reed-Solomon Math
The Bit Shift Paradox: How "Optimizing" Can Make Code 6× Slower
hackernoon.com·3d
🧮Compute Optimization
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·22h
💎Information Crystallography
Randomized and quantum approximate matrix multiplication
arxiv.org·1d
🔐Quantum Cryptography
Announcing coreboot 25.09 release
blogs.coreboot.org·8h
🔌Operating system internals
Parallelizing Cellular Automata with WebGPU Compute Shaders
vectrx.substack.com·23h·
Discuss: Substack
🔲Cellular Automata
Can an LLM Be a Black-Box Optimizer?
posgeo.wordpress.com·49m·
Discuss: Hacker News
🧮Kolmogorov Bounds
Three ways formally verified code can go wrong in practice
buttondown.com·15h
📜Proof Carrying Code
My First Week of Vibecoding
underreacted.leaflet.pub·5h·
Discuss: Hacker News
🎯Gradual Typing
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.dev·1d·
Discuss: Hacker News
🔐Hash Functions
PCBs and parts are on hand - beginning construction of new 1130MRAM board
rescue1130.blogspot.com·1d·
⚙️DIY Electronics
BYOVD to the next level (part 2) — rootkit like it's 2025
blog.quarkslab.com·2d
🔍eBPF
Enhanced SoC Design via Adaptive Topology Optimization with Reinforcement Learning
dev.to·1d·
Discuss: DEV
🧩RISC-V
How to store ordered information in a Relational Database (2015)
softwareengineering.stackexchange.com·1d·
🧮Algebraic Datatypes
Trusted Execution Environments? More Like "Trust Us, Bro" Environments
libroot.org·14h·
Discuss: Hacker News
🛡️RISC-V Security
Linux SBCs for development + RE
zetier.com·1d
🎯Emulator Accuracy
Cryptography for the Everyday Developer: Number Theory for Public Key Cryptography
sookocheff.com·3d
🔢Reed-Solomon Math