-
This morning, Chris and I met with Victoria from CRLT to talk more about how to cover the topics of stereotype threat and imposter syndrome. As a reminder, we were thinking of covering these relativel…
-
# Potential solution
The solution involves a comprehensive approach to address the issues identified in the file-level reports. The plan includes verifying environment variables, optimizing external r…
-
A method for evaluating software architectures relative to quality attribute goals.
A leading method in the area of software architecture evaluation.
It aids in eliciting sets of quality requirem…
-
I need to create a complex actor using some private methods to update the internal state, but I cannot find any useful base class to implement `ActorJob`.
What is the best practice in such case?
-
The EUDI Wallet Team of the European Commission invited subject-matter experts (i.e. cryptographers) to participate in a Webex meeting on June 5th or 6th, 2024, in which the team presented their curre…
-
1. Since C3R serves for privacy computing and emphasizes its cryptographic security, have you ever considered other technique routes beyonds TEE, like secure multi-party computation, homomorphic encry…
-
Suppose there is such a scenario, A reads the encrypted balance of B in the contract, then through homomorphic operations got another value, finally he views the value and by doing the revert calculat…
-
## Description
Create a blind app inspired by a Nillion tinydemo library (**tinybid** auction, **tinybio** biometric auth, **tinybin** API data integration)
![Image](https://github.com/NillionNetwo…
-
For a comparision and evaulation of different rendering algorithms I wanted to implement OPSI renderer (Wittek 2002) to SSR.
The idea is to base it on the WFS renderer (for a start I copied the co…
-
This is the issue for testing out approaches to floating-point rounding mode control, which is required for performant interval arithmetic. The original informal discussion is found [here](https://git…