Keccak will now become NIST’s SHA-3 hash algorithm
Eve’s SHA3 candidate: malicious hashing (PDF), by Jean-Philippe Aumasson.
“We investigate the definition and construction of hash functions that
incorporate a backdoor allowing their designer (and only her) to
efficiently compute collisions, preimages, or more.”
Red25519 provides a Ruby binding to the Ed25519 public-key signature
system based on elliptic curves and created by Dan Bernstein et al.
K is a rewrite-based executable semantic framework in which programming languages, type systems and formal analysis tools can be defined using configurations, computations and rules.
Z3 source code is now available. The source code can be used for
Ansible, is a model-driven configuration management, multi-node
deployment, and remote task execution system. Only needs SSH on the
The American Man’s Scotch Pronunciation Guide, essential.
The Monotone Symphony, by Yves Klein. 100% better than Cage, IMO.
Zoe Leonard - I Want A President (1992).
Animals with Misleading Names