Cryptography for the Everyday Developer: Number Theory for Public Key Cryptography
sookocheff.comยท4h
๐Ÿ”ขReed-Solomon Math
Nix pills
nixos.orgยท2d
โ„๏ธNixpkgs
What People Are Getting Wrong This Week: The North Carolina Cryptid
lifehacker.comยท2h
๐Ÿ”Tape Forensics
Oracle patches critical E-Business Suite flaw exploited by Cl0p hackers
securityaffairs.comยท1d
๐Ÿ”“Hacking
Meet the Flummoxagon
n-e-r-v-o-u-s.comยท3hยท
Discuss: Hacker News
๐Ÿ“Mathematical Art
The Making of Digital Identity โ€“ The Birth of Digital Authentication
syntheticauth.aiยท2dยท
๐Ÿ”PKI Archaeology
Inspiring Google Developers video retrospective
dev.toยท17hยท
Discuss: DEV
๐Ÿ”ŒArchive APIs
Automatic Building Code Review: A Case Study
arxiv.orgยท1d
๐Ÿ“Code Metrics
Aria: An Agent For Retrieval and Iterative Auto-Formalization via Dependency Graph
arxiv.orgยท12h
โšกProof Automation
POEM: Explore Unexplored Reliable Samples to Enhance Test-Time Adaptation
arxiv.orgยท12h
๐ŸงฎKolmogorov Complexity
CCD-Bench: Probing Cultural Conflict in Large Language Model Decision-Making
arxiv.orgยท12h
๐ŸŒCultural Algorithms
Unlocking Uniqueness: Mastering the Unique Character Algorithm in Go
dev.toยท1dยท
Discuss: DEV
๐ŸŒณTrie Structures
SpeechCT-CLIP: Distilling Text-Image Knowledge to Speech for Voice-Native Multimodal CT Analysis
arxiv.orgยท1d
๐ŸŽ™๏ธWhisper
Bidirectional Mammogram View Translation with Column-Aware and Implicit 3D Conditional Diffusion
arxiv.orgยท12h
โŸทBidirectional Programming
Distribution Preference Optimization: A Fine-grained Perspective for LLM Unlearning
arxiv.orgยท12h
๐Ÿ’ปLocal LLMs
Vector Trifference
arxiv.orgยท12h
๐Ÿ“Linear Algebra
Generalization of LiNGAM that allows confounding
arxiv.orgยท12h
๐Ÿ”—Monadic Parsing
Med-K2N: Flexible K-to-N Modality Translation for Medical Image Synthesis
arxiv.orgยท1d
๐Ÿง Machine Learning