Newest Stories by kyle
Home
Recent
Comments
Search
Login
12
A Graduate Course in Applied Cryptography
pdf
security
crypto.stanford.edu
via
kyle
3 years ago
|
cached
|
3 comments
3
15
State of the Common Lisp Ecosystem, 2015
lisp
eudoxia.me
via
kyle
3 years ago
|
cached
|
7 comments
7
5
When a synonym-stream is useful
lisp
lisptips.com
via
kyle
3 years ago
|
cached
|
no comments
0
7
Debugging Lisp Part 5: Miscellaneous
lisp
malisper.me
via
kyle
3 years ago
|
cached
|
no comments
0
6
Software Needs Seatbelts and Airbags
programming
medium.com
via
kyle
3 years ago
|
cached
|
no comments
0
19
The network is hostile
security
blog.cryptographyengineering.c
om
via
kyle
3 years ago
|
cached
|
no comments
0
4
On Safenet HSM key-extraction vulnerability CVE-2015-5464 (part I)
security
randomoracle.wordpress.com
via
kyle
3 years ago
|
cached
|
no comments
0
4
Programming Guide - Unix* System [1983]
pdf
unix
bitsavers.trailing-edge.com
via
kyle
3 years ago
|
cached
|
1 comment
1
19
Harvey-OS: an effort to get the Plan 9 code working with gcc and clang
release
github.com
via
kyle
3 years ago
|
cached
|
1 comment
1
6
Debugging Lisp Part 2: Inspecting
lisp
malisper.me
via
kyle
3 years ago
|
cached
|
2 comments
2
6
Debugging Lisp Part 1: Recompilation
lisp
malisper.me
via
kyle
3 years ago
|
cached
|
no comments
0
10
Memory Management Reference
programming
memorymanagement.org
via
kyle
3 years ago
|
cached
|
no comments
0
19
Running Lisp in Production
lisp
tech.grammarly.com
via
kyle
3 years ago
|
cached
|
no comments
0
10
How to build your own public key infrastructure
☶
security
blog.cloudflare.com
via
kyle
3 years ago
|
cached
|
2 comments
2
23
What's everyone working on this week?
☶
ask
via
kyle
3 years ago
|
41 comments
41
4
Security Analysis of Android Factory Resets
pdf
android
security
cl.cam.ac.uk
via
kyle
3 years ago
|
cached
|
no comments
0
10
AEADs: getting better at symmetric cryptography
security
imperialviolet.org
via
kyle
3 years ago
|
cached
|
no comments
0
6
The Little MAC Attack
security
dankaminsky.com
via
kyle
3 years ago
|
cached
|
no comments
0
6
Delegation is the Cornerstone of Civilization: Sharing in Sandstorm.io
security
blog.sandstorm.io
via
kyle
3 years ago
|
cached
|
no comments
0
4
Project MF
☶
hardware
networking
projectmf.org
via
kyle
3 years ago
|
cached
|
no comments
0
14
Out of the Tar Pit
compsci
blog.acolyer.org
via
kyle
3 years ago
|
cached
|
3 comments
3
15
How to Sell Excellence
haskell
docs.google.com
via
kyle
3 years ago
|
cached
|
42 comments
42
5
Implementation of promises for Coq
compsci
coq-blog.clarus.me
via
kyle
3 years ago
|
cached
|
no comments
0
21
Programmers: You Probably Don’t Know What a Computer Is
compsci
medium.com
via
kyle
3 years ago
|
cached
|
3 comments
3
13
Concurrency with promises in Coq
compsci
coq-blog.clarus.me
via
kyle
3 years ago
|
cached
|
no comments
0
<< Page 1
|
Page 3 >>