Hacker News – Telegram
NSA and IETF: Can an attacker purchase standardization of weakened cryptography?
Article, Comments
🖕6👍2🌭2
XiangShan Vector Floating-Point Unit Design
Article, Comments
🌭3
Mathematical Models/Algorithms for Optimization of Lego Construction Problems [pdf]
Article, Comments
🌭7
Procedural generation with Wave Function Collapse (2019)
Article, Comments
👍5🌭1