1MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles (opens in new tab)(usenix.org)2alexis-d1y ago0
7How Modern SQL Databases Come Up with Algorithms You Would Have Never Dreamed Of (opens in new tab)(youtube.com)1alexis-d9y ago0
8Explaining the Unexplainable (2013) – Understanding Posgtres' EXPLAIN (opens in new tab)(depesz.com)2alexis-d9y ago0
9Do Not Dollar-Cost-Average for More Than Twelve Months (1997) (opens in new tab)(efficientfrontier.com)3alexis-d9y ago0
10A Method for Obtaining Digital Signatures and Public-Key Cryptosystems [1978] [pdf] (opens in new tab)(people.csail.mit.edu)4alexis-d10y ago0
13Understanding Common Factor Attacks: An RSA-Cracking Puzzle (opens in new tab)(loyalty.org)2alexis-d10y ago0