Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.orgยท19hยท
Discuss: Hacker News
๐Ÿ”ขReed-Solomon Math
The Why of PGP Authentication
articles.59.caยท6h
๐Ÿ”‘Cryptographic Protocols
Homomorphism Problems in Graph Databases and Automatic Structures
arxiv.orgยท15h
๐Ÿ”—Graph Isomorphism
Three ways formally verified code can go wrong in practice
buttondown.comยท2h
๐Ÿ“œProof Carrying Code
A Proof of the Riemann Hypothesis
dev.toยท1dยท
Discuss: DEV
โš”๏ธLean Theorem
Experimenting with ACL2 and Claude Code
mikedodds.orgยท7hยท
Discuss: Hacker News
๐Ÿ‘‘Isabelle
An enough week
blog.mitrichev.chยท23hยท
๐ŸงฎZ3 Solver
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.comยท9h
๐Ÿ’ŽInformation Crystallography
Cryptography for the Everyday Developer: Number Theory for Public Key Cryptography
sookocheff.comยท3d
๐Ÿ”ขReed-Solomon Math
Triple Threat: Signal's Ratchet Goes Post-Quantum
blog.quarkslab.comยท3d
๐Ÿ”Quantum Security
Toy Binary Decision Diagrams
philipzucker.comยท4d
๐ŸงฎAlgebraic Datatypes
More on Carmichael
johndcook.comยท1dยท
Discuss: Hacker News
๐Ÿ”ขReed-Solomon Math
Defeating Return Type Polymorphism
philipphagenlocher.deยท1dยท
Discuss: Hacker News
๐ŸงฌFunctional Programming
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.devยท1dยท
Discuss: Hacker News
๐Ÿ”Hash Functions
Sorting encrypted data without decryption: a practical trick
dev.toยท4hยท
Discuss: DEV
๐Ÿ”Hash Functions
Show HN: Twoway, a Go package for HPKE encrypted request-response flows
github.comยท2dยท
๐Ÿ”‘Cryptographic Protocols
Beyond the Classroom: Enhancing Security and Productivity with Jamf Safe Internet
jamf.comยท6h
๐Ÿ›กCybersecurity
Cactus Language โ€ข Semantics 3
inquiryintoinquiry.comยท3h
๐Ÿ”ขDenotational Semantics
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.comยท5h
๐Ÿ”“Hacking
APRS over LoRa with RNode | unsigned.io
unsigned.ioยท8h
๐Ÿ“ปHomebrew Protocols