-
I would like to ask for comments about the following situation.
Let us look at functions like `Orbit` or `Permutation` from the viewpoint
that they apply (group) elements to points, identify the i…
-
SHA-3 support was added to the JDK in [JEP 287](http://openjdk.java.net/jeps/287). It would be nice to allow using these for hashing and HMAC.
-
#### Problem
We don't have a micro-ecc backend for our crypto PAL
#### Proposed Solution
Maybe we should.
-
I think this project's scope is too broad, which causes a relatively high-volume of maintenance work and reliance on internals (including details of printing / string representations, which are not co…
-
What are you trying to achieve?
Use the sharp library to compare an input image to hundreds/thousands of images to find the closest match at speeds 100x faster than https://github.com/mapbox/pixelmat…
-
From a flaky test in geopandas, I observed the following behaviour:
```
In [1]: pd.__version__
Out[1]: '0.25.0.dev0+791.gf0919f272'
In [2]: from shapely.geometry import Point
In [3]: a = n…
-
I'm not sure if you've seen this proposal: https://github.com/w3c/web-advertising/blob/master/privacy_preserving_lookalike_audience_targeting.md
The key idea there is to use the Aggregated Reportin…
-
I think security awareness is a big issue that has to be considered: I am not worrying about developers who are no security experts, but developers who are no security experts and who are neither awar…
-
I used a RIOT OS example, which uses CCN Lite as library. Some errors occurred. I fixed them line by line. Mostly unsigned Int and signed Int comparison. I reached a point where I got the following er…
-
Julia uses the `hash` function in the `Dict` object when keys are strings. Under the hood this uses MurmurHash3. While for most input MurmurHash3 results in an optimal distribution, an attacker can cr…