๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽฏ Interactive Provers

Proof Development, Tactic Languages, Theorem Proving, Mathematical Verification

Effectively Zero-Knowledge Proofs for NP with No Interaction, No Setup
eccc.weizmann.ac.ilยท9hยท
Discuss: Hacker News
๐ŸŽฏProof Tactics
Heterogeneous Dynamic Logic: Provability Modulo Program Theories
arxiv.orgยท2d
๐Ÿง Computational Logic
CVE-2025-4919: Corruption via Math Space in Mozilla Firefox
thezdi.comยท16h
๐Ÿฆ€Rust Verification
Functional Abstract Interpretation
simon.peytonjones.orgยท1dยท
Discuss: Hacker News
๐Ÿ”—Functional Compilers
W1seGuy | TryHackMe Walkthrough โ€” XOR? BrUt3_F0rC3 iT
infosecwriteups.comยท1d
๐Ÿ”Cryptographic Archaeology
Asymmetry of Verification and Verifier's Law
jasonwei.netยท5hยท
Discuss: Hacker News
๐Ÿ”ฎProof Search
To be a better programmer, write little proofs in your head
the-nerve-blog.ghost.ioยท1dยท
Discuss: Hacker News, r/programming
๐Ÿ›ก๏ธPreservation Proofs
Pointwise definable end-extensions of models of arithmetic and set theory, Changchun, China, July 2025
jdh.hamkins.orgยท1d
๐Ÿ—๏ธConstructive Mathematics
FSM Library for Embedded C Projects
hackster.ioยท2d
๐Ÿฆ€Embedded Rust
Cactus Language โ€ข Stylistics 4
inquiryintoinquiry.comยท15h
๐ŸŒณContext free grammars
Uncensored Multi-Agent AI Debate System Locally with Knowledge Base Now with a UI! (Part 3)Full code.
dev.toยท17hยท
Discuss: DEV
๐Ÿ“ABNF Parsing
Binary Search in a 2D Matrix
mmhaskell.comยท1d
๐Ÿ“Error Bounds
Math Game Monday: Krypto Insanity
denisegaskins.comยท1d
๐Ÿ”ฒCellular Automata
Performance Hacks for Bradyโ€™s Algorithm
nickdrozd.github.ioยท1d
๐ŸŽž๏ธTape Combinatorics
Checking data integrity
eclecticlight.coยท22m
โœ…Checksum Validation
Protocols for Verifying Smooth Strategies in Bandits and Games
arxiv.orgยท2h
๐ŸŽฏPerformance Proofs
Know Your Playground: The Essential Guide to Algorand for MEV Enthusiasts
hackernoon.comยท15h
๐Ÿ”—Hash Chains
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.comยท7hยท
Discuss: Lobsters, Hacker News
๐Ÿ›ก๏ธeBPF Security
Edsger W. Dijkstra on IPW's
cs.utexas.eduยท10hยท
Discuss: Hacker News
๐Ÿ‡ท๐Ÿ‡บSoviet Computing
A Practical Two-Stage Recipe for Mathematical LLMs: Maximizing Accuracy with SFT and Efficiency with Reinforcement Learning
arxiv.orgยท2d
๐Ÿ’ปLocal LLMs
Loading...Loading more...
AboutBlogChangelogRoadmap