🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔧 Reed-Solomon

Galois Fields, Polynomial Codes, CD Error Correction, BCH Extension

Ancient Egyptian multiplication - Wikipedia
en.m.wikipedia.org·2d
🗝️Paleocryptography
KL-001-2025-007: Schneider Electric EcoStruxure IT Data Center Expert Unauthenticated Remote Code Execution
seclists.org·12h
🛡️eBPF Security
A Formal Refutation of the Blockchain Trilemma
arxiv.org·1d
🤝Distributed Consensus
Puzzle Languages
prog21.dadgum.com·1d·
Discuss: Lobsters
💻Programming languages
Lambda calculus cooked N ways: Benchmarks for capture-avoiding substitution
github.com·2d·
Discuss: Hacker News
λLambda Formalization
Efficient Quantum Access Model for Sparse Structured Matrices using Linear Combination of Things
arxiv.org·2d
⚛️Quantum Algorithms
A New Blueprint for Bitcoin Contracts: Off-Chain Efficiency, On-Chain Guarantees
hackernoon.com·2d
🔗Hash Chains
Iceberg, the Right Idea – The Wrong Spec – Part 2 of 2: The Spec
database-doctor.com·13h·
Discuss: Hacker News
🔧KAITAI
Deep Dive into Rails Database Connection Pools
prateekcodes.dev·9h·
Discuss: Hacker News
🌊Streaming Systems
I solved the IIT-JEE Mains paper with LLM. Here are the results
iexplain.app·2d·
Discuss: Hacker News
📐Interval Arithmetic
The Ancient History of Compression Algorithms
cs4fn.org·3h·
Discuss: Hacker News
📊Compression Proofs
Towards Exception Safety Code Generation with Intermediate Representation Agents Framework
arxiv.org·1d
⚔️Lean Tactics
Business Wire: "JEDEC Releases New LPDDR6 Standard to Enhance Mobile and AI Memory Performance"
businesswire.com·16h·
Discuss: Hacker News, r/hardware
🔧Hardware Verification
Wrapless: The trustless lending protocol on top of Bitcoin
arxiv.org·1d
🔗Hash Chains
The REM-arkable Misadventures of LIST
masswerk.at·2d·
Discuss: Hacker News
📺VT100
Modern Electric Vehicle Infrastructure Security
ocpp.us·2d·
Discuss: Hacker News
📻Homebrew Protocols
An InfoSec Architect's First Taste of Temporal
supasaf.com·1d·
Discuss: Hacker News
⏰Temporal Logic
Polyadic encryption
arxiv.org·1d
🌊Stream Ciphers
The Unreasonable Effectiveness of Recurrent Neural Networks
karpathy.github.io·5h·
Discuss: Hacker News
🧠Neural Codecs
Programming Extensible Data Types in Rust with CGP - Part 1: Modular App Construction and Extensible Builders
contextgeneric.dev·2d·
Discuss: Lobsters, Hacker News, r/programming
🔒Type Safety
Loading...Loading more...
AboutBlogChangelogRoadmap