-
## Problem
Deferred connections were invented to solve the problem that caused by constant implementation - `New` component is infinite emitter. As a result everywhere where constants are used we n…
-
### Problem
validTo value for orders in which EthFlow is the owner is constant at 4294967295.
### Impact
The value can be used by solvers to avoid orders that will expire within less than the e…
-
I am using this to mark an issue I have been dealing with over the past few months, that I finally noticed a few days ago.
Consider the following simple (non-)problem where we have an objective fun…
-
Consider the following C++ example. The functions log2(x), log10(x) and log(x) are folded, but log1p(x), logb(x), ilogb(x) are not.
https://godbolt.org/z/nzrncEE37
```cpp
#include
double f1() {…
-
The spec mentions that some values van be decode/encoded with a non-constant-time base64 encoding and secret values should use a constant-time base64.
To reduce the error, when implementing this sp…
-
I have been running a test for a few months on AWS using SNAP install of Wekan. Its been running well except the free tier causes issues and the server constantly needs to rebooted when more than 1 us…
-
Hi.
Reason of this proposal is described here: [Shinobi #452](https://gitlab.com/Shinobi-Systems/Shinobi/-/issues/452). Please also see note here: [Publish deprecation notice #6](https://github.com/…
-
Hello, I'm using ECDSA signing for a bitcoin implementation in java. and i have one question and one request if its possible
First Is the ECDSA signing with `ECDSASigner(HMacDSAKCalculator(SHA2561D…
ghost updated
4 years ago
-
Some header files contain constant expressions (usually from macros) that the compiler is able to evaluate at runtime. An example of this is in ctype.h: https://code.woboq.org/linux/include/ctype.h.ht…
-
The scalar multiplication on elliptic curves is a fundamental operation in elliptic curve cryptography. For example, this operation multiplies a point on the curve (typically a base point) by an integ…