🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔱 Galois Cryptography

Finite Field Arithmetic, Reed-Solomon Extensions, Polynomial Codes, Error Bounds

Worth Reading 062425
rule11.tech·23h
🌐DNS over QUIC
A Rubyist's guide to big-O notation
honeybadger.io·1d
🌳Trie Structures
Building Passwordless Authentication with Stytch
encore.dev·1d
🌐NetworkProtocols
Scales as Multipermutations of 0 and 1 into Twelve Places
petecorey.com·20h·
Discuss: Lobsters
🎼Audio Lambda Calculus
Algorithm Complexity: Time, Space, and Big-O Notation
dev.to·1d·
Discuss: DEV
🧮Kolmogorov Complexity
Comparing Rust, JavaScript and Go for Authoring WASM Components
obeli.sk·1d·
Discuss: Hacker News
🧩WASM Modules
Memory Safety in Web Rust System Zero Cost Secure(1750885516953300)
dev.to·17h·
Discuss: DEV
🦀Rust Borrowing
From Zero to One: A Complete Guide to Implementing WeChat Sharing in HarmonyOS
dev.to·1d·
Discuss: DEV
⚡Modern Compression
COIN: Uncertainty-Guarding Selective Question Answering for Foundation Models with Provable Risk Guarantees
arxiv.org·10h
🧠Intelligence Compression
Bounds for Geometric rank in Terms of Subrank
arxiv.org·3d
🎯Performance Proofs
Your Token Becomes Worthless: Unveiling Rug Pull Schemes in Crypto Token via Code-and-Transaction Fusion Analysis
arxiv.org·2d
🔗Hash Chains
An ab initio foundation model of wavefunctions that accurately describes chemical bond breaking
arxiv.org·10h
🕸️Tensor Networks
How much slower is random access, really?
samestep.com·3d·
Discuss: Hacker News
📼Tape Encoding
AMF-MedIT: An Efficient Align-Modulation-Fusion Framework for Medical Image-Tabular Data
arxiv.org·1d
🤖Advanced OCR
daily quizzz
dev.to·1d·
Discuss: DEV
λLambda Encodings
Probe before You Talk: Towards Black-box Defense against Backdoor Unalignment for Large Language Models
arxiv.org·3d
🔒Language-based security
Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.com·1d
📋Protocol Buffers
⚔️ The Josephus Problem Explained: Constant-Time Solution for k = 2
dev.to·4h·
Discuss: DEV
🌳Trie Structures
Compbolt: A lib with a hard to misuse API (based on Matt Godbolt)
github.com·1d·
Discuss: Hacker News
🌀Brotli Internals
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols(1750830996145900)
dev.to·1d·
Discuss: DEV
🌐Network Protocols
Loading...Loading more...
AboutBlogChangelogRoadmap