Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.orgยท1dยท
Discuss: Hacker News
๐Ÿ”ขReed-Solomon Math
The Why of PGP Authentication
articles.59.caยท16h
๐Ÿ”‘Cryptographic Protocols
Homomorphism Problems in Graph Databases and Automatic Structures
arxiv.orgยท1d
๐Ÿ”—Graph Isomorphism
BQN "Macros" with โ€ขDecompose (2023)
saltysylvi.github.ioยท7hยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
A Proof of the Riemann Hypothesis
dev.toยท2dยท
Discuss: DEV
โš”๏ธLean Theorem
Three ways formally verified code can go wrong in practice
buttondown.comยท11h
๐Ÿ“œProof Carrying Code
An enough week
blog.mitrichev.chยท1dยท
๐ŸงฎZ3 Solver
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.comยท19h
๐Ÿ’ŽInformation Crystallography
Cryptography for the Everyday Developer: Number Theory for Public Key Cryptography
sookocheff.comยท3d
๐Ÿ”ขReed-Solomon Math
Experimenting with ACL2 and Claude Code
mikedodds.orgยท16hยท
Discuss: Hacker News
๐Ÿ‘‘Isabelle
Triple Threat: Signal's Ratchet Goes Post-Quantum
blog.quarkslab.comยท4d
๐Ÿ”Quantum Security
More on Carmichael
johndcook.comยท1dยท
Discuss: Hacker News
๐Ÿ”ขReed-Solomon Math
Toy Binary Decision Diagrams
philipzucker.comยท5d
๐ŸงฎAlgebraic Datatypes
Hardware Vulnerability Allows Attackers to Hack AI Training Data โ€“ NC State News
news.ncsu.eduยท8hยท
Discuss: Hacker News
๐Ÿ”RISC-V Cryptography
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.devยท1dยท
Discuss: Hacker News
๐Ÿ”Hash Functions
Sorting encrypted data without decryption: a practical trick
dev.toยท13hยท
Discuss: DEV
๐Ÿ”Hash Functions
My First Week of Vibecoding
underreacted.leaflet.pubยท2hยท
Discuss: Hacker News
๐ŸŽฏGradual Typing
Show HN: Twoway, a Go package for HPKE encrypted request-response flows
github.comยท2dยท
๐Ÿ”‘Cryptographic Protocols
A Function Generator From The Past
hackaday.comยท10h
โšกCircuit Archaeology
Cactus Language โ€ข Semantics 3
inquiryintoinquiry.comยท13h
๐Ÿ”ขDenotational Semantics