Keccak will now become NIST’s SHA-3 hash algorithm
Eve’s SHA3 candidate: malicious hashing (PDF), by Jean-Philippe Aumasson. “We investigate the definition and construction of hash functions that incorporate a backdoor allowing their designer (and only her) to efficiently compute collisions, preimages, or more.”
Red25519 provides a Ruby binding to the Ed25519 public-key signature system based on elliptic curves and created by Dan Bernstein et al.
K is a rewrite-based executable semantic framework in which programming languages, type systems and formal analysis tools can be defined using configurations, computations and rules.
Z3 source code is now available. The source code can be used for non-commercial purposes.
Ansible, is a model-driven configuration management, multi-node deployment, and remote task execution system. Only needs SSH on the nodes.
Empty Black, very good JavaScript jump&run by Mary Rose Cook.
The American Man’s Scotch Pronunciation Guide, essential.
The Monotone Symphony, by Yves Klein. 100% better than Cage, IMO.
Zoe Leonard - I Want A President (1992).