Antisocial Coding: My Year at GitHub, by Coraline Ada Ehmke.
Sliding right into disaster: Left-to-right sliding windows leak,
by Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot
Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal,
and Yuval Yarom.
“In this paper we demonstrate a complete break of RSA-1024 as
implemented in Libgcrypt. Our attack makes essential use of the fact
that Libgcrypt uses the left-to-right method for computing the
How I found a bug in Intel Skylake processors, by Xavier Leroy.
RustBelt: Securing the Foundations of the Rust Programming Language (PDF),
by Ralf Jung, Jacques-Henri Jourdan, Robbert Krebbers, and Derek Dreyer.
Avery’s laws of WiFi reliability
Let’s Encrypt Wildcard Certificates Coming January 2018
The APL idiom list (PDF, 1977) by Alan J. Perlis and Spencer Rugaber.
Multics Simulator, by Harry Reed and Charles Anthony.
“A complete QuickStart installation package is available that provides
software, compilers, system source, install scripts, and several
initial projects (SysDaemon, SysAdmin, Daemon, etc.) and users.”
Counterintuitive problem: Everyone in a room keeps giving dollars to