🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔧 Reed-Solomon

Galois Fields, Polynomial Codes, CD Error Correction, BCH Extension

Superimposed codes, take two
blog.sesse.net·1d
🔢Bitwise Algorithms
Regular Expression Matching Can Be Simple and Fast (2007)
swtch.com·5h·
Discuss: Hacker News
🔍RegEx Engines
Wrapless: The trustless lending protocol on top of Bitcoin
arxiv.org·23h
🔗Hash Chains
Synthesis of deuterated acids and bases using bipolar membranes
nature.com·11h
🌈Spectroscopy
“Split Signing Algorithms for COSE” and “ARKG” updated in preparation for IETF 123
self-issued.info·4h
🔑Cryptographic Protocols
Helix Parallelism: Sharding Strategies for Multi-Million-Token LLM Decoding
research.nvidia.com·7h·
Discuss: Hacker News
⚡Cache Coherence
eSIM security research (GSMA eUICC compromise and certificate theft)
seclists.org·18h
🏺Kerberos Archaeology
Functional Programming in 40 Minutes • Russ Olsen • GOTO 2024
youtube.com·15h
🧬Functional Programming
Algebra Problems of the Day (Algebra Regents, June 2025 Part II)
mrburkemath.blogspot.com·8h·
Discuss: www.blogger.com
📐Linear Algebra
Approach to mainframe penetration testing on z/OS. Deep dive into RACF
securelist.com·1d
🗄️Database Internals
Data Over Time
blog.julik.nl·1d
🧬Bitstream Evolution
Essential FreeBSD Tools and Commands
discoverbsd.com·11h
🔌Operating system internals
Btrfs Allocator Hints
lwn.net·15h·
Discuss: Hacker News
📦Content Addressing
Why LLMs Can't Write Q/Kdb+: Writing Code Right-to-Left
medium.com·1d·
Discuss: Hacker News
💻Programming languages
Towards Exception Safety Code Generation with Intermediate Representation Agents Framework
arxiv.org·23h
⚔️Lean Tactics
Ancient Egyptian multiplication - Wikipedia
en.m.wikipedia.org·2d
🗝️Paleocryptography
HMQ: Principal Type Inference Under a Prefix
microsoft.com·9h·
Discuss: Hacker News
🔍Type Inference
Encryption and Decryption in Go: A Hands-On Guide
dev.to·1d·
Discuss: DEV
🌊Stream Ciphers
Efficient Quantum Access Model for Sparse Structured Matrices using Linear Combination of Things
arxiv.org·1d
⚛️Quantum Algorithms
Computer Scientists Figure Out How To Prove Lies
quantamagazine.org·12h·
Discuss: Hacker News, Hacker News
🔗Hash Chains
Loading...Loading more...
AboutBlogChangelogRoadmap