Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.orgยท19hยท
Discuss: Hacker News
๐Ÿ”ขReed-Solomon Math
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.comยท9h
๐Ÿ’ŽInformation Crystallography
The Why of PGP Authentication
articles.59.caยท6h
๐Ÿ”‘Cryptographic Protocols
Three ways formally verified code can go wrong in practice
buttondown.comยท2h
๐Ÿ“œProof Carrying Code
Let's Write a Macro in Rust
hackeryarn.comยท3hยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
More on Carmichael
johndcook.comยท1dยท
Discuss: Hacker News
๐Ÿ”ขReed-Solomon Math
Stable ferroaxial states offer a new type of light-controlled non-volatile memory
phys.orgยท2h
โš›๏ธQuantum Tape
Prime Portraits
archive.bridgesmathart.orgยท23h
๐Ÿ“Mathematical Art
A Proof of the Riemann Hypothesis
dev.toยท1dยท
Discuss: DEV
โš”๏ธLean Theorem
GaloisInc/parameterized-utils
github.comยท2d
๐ŸงฎAlgebraic Datatypes
Erlang-Red Walkthrough โ€“ Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.comยท5hยท
Discuss: Hacker News
๐ŸŒProtocol Synthesis
An enough week
blog.mitrichev.chยท23hยท
๐ŸงฎZ3 Solver
Slip โ€“ A Lisp System in JavaScript
lisperator.netยท5hยท
Discuss: Hacker News
๐Ÿ”—Lisp
Experimenting with ACL2 and Claude Code
mikedodds.orgยท7hยท
Discuss: Hacker News
๐Ÿ‘‘Isabelle
Cactus Language โ€ข Semantics 3
inquiryintoinquiry.comยท3h
๐Ÿ”ขDenotational Semantics
Cryptography for the Everyday Developer: Number Theory for Public Key Cryptography
sookocheff.comยท3d
๐Ÿ”ขReed-Solomon Math
How to store ordered information in a Relational Database (2015)
softwareengineering.stackexchange.comยท1dยท
๐ŸงฎAlgebraic Datatypes
Learning from software errors โ€“ Part 3: A Mars probe gets out of control
heise.deยท11h
๐Ÿ“žSession Types
#14 Logarithm ....History and Etymology of Math Terms
pballew.blogspot.comยท13hยท
๐Ÿ“ŠAPL Heritage