Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
minimax
.
5
Announcing the ‘blst’ BLS verification project
cryptography
distributed
formalmethods
galois.com
via
minimax
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
7
Nagini: an automated, modular verifier for Python
formalmethods
python
pm.inf.ethz.ch
via
minimax
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
32
Factor programming language
plt
factorcode.org
via
minimax
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
24 comments
24
7
Multi-Touch Systems that I Have Known and Loved
design
hardware
osdev
billbuxton.com
via
minimax
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
4
How did software get so reliable without proof?
formalmethods
practices
surfingcomplexity.blog
via
minimax
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
18
New fuzzing tool finds 26 USB bugs in Linux, Windows, macOS, and FreeBSD
security
testing
zdnet.com
via
minimax
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
19 comments
19
11
Landmark Computer Science Proof Cascades Through Physics and Math
compsci
math
science
quantamagazine.org
via
minimax
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
6
Systems Benchmarking Crimes
hardware
testing
cse.unsw.edu.au
via
minimax
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
5
AdaCore Technologies for Cyber Security
book
security
adacore.com
via
minimax
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
21
Haskell - An Experience Summary
haskell
holmusk.dev
via
minimax
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Linux Foundation launches ELISA project for safety-critical systems
linux
venturebeat.com
via
minimax
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
The US could regulate AI in the name of national security
ai
law
qz.com
via
minimax
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
6
The Discoveries of Continuations (1993)
☶
pdf
compilers
historical
math
math.bas.bg
via
minimax
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System
formalmethods
practices
security
usenix.org
via
minimax
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
7
Free & Fair: Open source elections technology
formalmethods
security
freeandfair.us
via
minimax
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
Hardware Implants
hardware
security
securinghardware.com
via
minimax
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
7
Formal Proofs, the Fine Print and Side Effects
pdf
formalmethods
security
people.eng.unimelb.edu.au
via
minimax
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
3
Round5: compact and fast post-quantum public-key encryption
cryptography
round5.org
via
minimax
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
29
rv8 RISC-V simulator for x86-64
hardware
rv8.io
via
minimax
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
10
Easy-to-use, FPGA-accelerated Cycle-accurate Hardware Simulation of RISC-V Systems in the Cloud
hardware
virtualization
fires.im
via
minimax
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
11
Forvis: A Formal RISC-V ISA Specification
formalmethods
hardware
haskell
github.com
via
minimax
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
19
RISC-V Foundation Forms Security Committee
hardware
security
embedded-computing.com
via
minimax
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
freenode Security Update: Reused Password Attack
culture
security
freenode.net
via
minimax
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
3
AMD’s EPYC server encryption is the latest security system to fall
hardware
security
virtualization
networkworld.com
via
minimax
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Crypko [AI Blockchain Anime]
ai
art
merkle-trees
crypko.ai
via
minimax
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
Page 2 >>