-
-
Brainstorming issue for changes planned for v5 of the guidelines. A few things should be discussed:
1. Removing 3DES from the intermediate level. [Data shows](https://jve.linuxwall.info/blog/index.…
-
**Submitting author:** @cbjuan (Juan Cruz-Benito)
**Repository:** https://github.com/Qiskit/qiskit-vscode/
**Version:** v0.4.1
**Editor:** @danielskatz
**Reviewers:** @malmaud, @naberek
**Author ins…
-
We need to figure out how to generate `g` and `h` parameters used for discrete log problem in Pedersen VSS.
This card covers research and pseudocode implementation of the setup protocol.
-
Does the current system have a mechanism to prevent revolutionary supercomputer attacks? The quantum computer research has made progress. If a country develops a quantum computer in a few years, with …
-
Consider this "issue" positive feedback.
I've used 'calc' for years, and it's great. Easy to use, text based, intuitive, powerful, and the best part of all; it's constantly inviting to experimentat…
-
# Description
> "There's a straightforward mitigation though: double the key size. In a post-quantum world, AES-256 is still comfortably secure. PGP and GPG are programs that use a variety of crypt…
-
See the #247 comment thread
@hyc:
> Monero is still the only coin that is private by default - it's the one that should be recommended first.
ghost updated
5 years ago
-
### Kernel Convolution
This is the process of convolving a small matrix(called a kernel) of size 3\*3 or 5\*5 or any odd\*odd size over a larger matrix(of pixels) to get values of pixels based on the…
-
Hi folks,
I'd be really keen to help build up a community of RSEs in Australia. What would be the best way to get involved?
Nick
P.S. I'm an academic, based in Melbourne, and spend (or try to…