An efficient key recovery attack on SIDH (preliminary version), by Wouter Castryck and Thomas Decru. “Our Magma implementation breaks the instantiation SIKEp434, which aims at security level 1 of the Post-Quantum Cryptography standardization process currently ran by NIST, in about one hour on a single core.”
Implementing a Toy Optimizer, by Carl Friedrich Bolz-Tereick. Uses Union-Find.
µON, a compact and simple binary object notation. Clever use of invalid UTF-8 bytes.
Treadmill is a “real-time” in-place garbage collection algorithm designed by Henry Baker. Explained by Nikita Danilov.
Deterritorializing Programming Systems: For a Nomadology of Forth (1998), by Theodore M. Norton.