@brandonbryant02 @kelseyhightower While preemptive optimization is the root of all evil, after you have a well defined spec it's useful to use efficient data structures that fit your use case. Believe it or not, constant factors matter in real life. We o
14 followers
60 followers
@cybersecboardrm Hello! Look at this. https://t.co/7VYHbtJIV9
132 followers
RT @real_or_random: This paper describes the algorithm whicho @pwuille, Gleb Naumenko and Greg Maxwell implemented in #minisketch.
18 followers
Why aren't more security based protocols implementing a KES model? https://t.co/ISpcFiS1xE #cardano #privatekeysecurity