Cryptographic Issues in Cloudflare's Circl FourQ Implementation (CVE-2025-8556)
botanica.software·6h·
Discuss: Hacker News
⚗️Algebraic Coding
Flag this post
How the CIA’s Kryptos Sculpture Gave Up Its Final Secret
scientificamerican.com·1h
🔐Cryptographic Archaeology
Flag this post
Exploiting the Potential of Linearity in Automatic Differentiation and Computational Cryptography
arxiv.org·1d
👑Coq Tactics
Flag this post
Optimization by decoded quantum interferometry
nature.com·4h
⚛️Quantum Algorithms
Flag this post
Viete on Pythagorean Triples
pballew.blogspot.com·1d·
📐Interval Arithmetic
Flag this post
Why SSA?
mcyoung.xyz·1d·
🚀Compiler Optimizations
Flag this post
Formal or not formal? That is the question in AI for theorem proving.
xenaproject.wordpress.com·5h
🔬Lean
Flag this post
Business Logic Testing: Protect Mobile Apps from Exploits and Fraud
nowsecure.com·8h
🧪Binary Fuzzing
Flag this post
FreeBSD Security Advisory FreeBSD-SA-25:09.netinet
bsdsec.net·3h
🐡OpenBSD
Flag this post
A polynomial-based QCQP solver for encrypted optimization
arxiv.org·1d
🔐Homomorphic Encryption
Flag this post
Point-of-use theft: Vidar’s shift to API-level interception
techradar.com·6h
🕵️Vector Smuggling
Flag this post
Module Functors in OCaml
citizen428.net·1d
λLambda Formalization
Flag this post
Code Smell 311 - Plain Text Passwords
dev.to·1d·
Discuss: DEV
🔓Password Cracking
Flag this post
The Prime Scalar Field
theprimescalarfield.com·18h·
Discuss: Hacker News
📐Mathematical Art
Flag this post
Solving Regex Crosswords with Z3
blog.nelhage.com·1d·
Discuss: Hacker News
🧮Z3 Solver
Flag this post
The security paradox of local LLMs
quesma.com·7h·
🔓Hacking
Flag this post
Show HN: Cuq – Formal Verification of Rust GPU Kernels
github.com·44m·
🦀Rust Verification
Flag this post
Building an Open ABI and FFI for ML Systems
tvm.apache.org·18h·
Discuss: Hacker News
🔬Refinement Types
Flag this post
Batteries Not Included: Meet the Swiss Réglette!
hackaday.com·21h
🌊Stream Ciphers
Flag this post