Semi-Algebraic Proof Systems for QBF
arxiv.orgยท1d
๐Ÿ‘‘Coq Tactics
Flag this post
Lossless Compression with Asymmetric Numeral Systems (2020)
bjlkeng.ioยท2dยท
Discuss: Hacker News
๐ŸŽฏArithmetic Coding
Flag this post
How Does Digital Trust Actually Work? A Deep Dive into the Science of Secrecy
dev.toยท13hยท
Discuss: DEV
๐Ÿ”Cryptographic Archaeology
Flag this post
Optimal scaling for magic state distillation in quantum computing achieved
phys.orgยท21h
โš›๏ธQuantum Circuits
Flag this post
Finite State Machines and how to build any step by step flow in React From theory to practice
blog.codeminer42.comยท18h
๐Ÿ”„Finite State Machines
Flag this post
How do I get my client talking to the server with a signed certificate
colinpaice.blogยท1h
๐Ÿ”PKI Archaeology
Flag this post
Instant Parameter Selection for Modular Systems (b, p, t, r)
news.ycombinator.comยท18hยท
Discuss: Hacker News
๐Ÿ”งHardware Verification
Flag this post
Contagious Interview Actors Now Utilize JSON Storage Services for Malware Delivery
blog.nviso.euยท52m
๐Ÿ’ฟWORM Storage
Flag this post
How to Identify a Prime Number without a Computer
scientificamerican.comยท20hยท
Discuss: Hacker News
๐Ÿ“Interval Arithmetic
Flag this post
Reverse Engineering Yaesu FT-70D Firmware Encryption
landaire.netยท2hยท
Discuss: Hacker News
๐Ÿ”“Reverse engineering
Flag this post
iSeal: Encrypted Fingerprinting for Reliable LLM Ownership Verification
arxiv.orgยท4h
๐ŸŽตSpectral Hashing
Flag this post
One Weird Hashing Trick
notes.hella.cheapยท15hยท
๐Ÿ“šLempel-Ziv
Flag this post
Security vulnerabilities: Nvidia strengthens AI tools against potential attacks
heise.deยท16m
๐Ÿ”“Hacking
Flag this post
Pushing Past the First Error During Type Inference
thunderseethe.devยท3d
๐Ÿฆ€Rust Verification
Flag this post
Private CA for long-lived internal SSL certificates
certkit.ioยท16hยท
๐Ÿ”Certificate Analysis
Flag this post
You Thought It Was Over? Authentication Coercion Keeps Evolving
unit42.paloaltonetworks.comยท2d
๐ŸŽฏNTLM Attacks
Flag this post
A Practical Guide to Transitioning to Memory-Safe Languages
queue.acm.orgยท1hยท
๐Ÿ”’Type Safety
Flag this post
A fault-tolerant neutral-atom architecture for universal quantum computation
nature.comยท2d
โš›๏ธQuantum Error Correction
Flag this post
Generalized Security-Preserving Refinement for Concurrent Systems
arxiv.orgยท2d
๐ŸŒณArchive Merkle Trees
Flag this post