There's more to those colliding blocks that compute pi
https://www.youtube.com/watch?v=6dTyOl1fmDo [www.youtube.com]
2025-03-18 00:31
tags:
math
physics
quantum
video
visualization
The Pentium contains a complicated circuit to multiply by three
http://www.righto.com/2025/03/pentium-multiplier-adder-reverse-engineered.html [www.righto.com]
2025-03-14 23:21
tags:
article
cpu
hardware
investigation
math
In 1993, Intel released the high-performance Pentium processor, the start of the long-running Pentium line. I’ve been examining the Pentium’s circuitry in detail and I came across a circuit to multiply by three, a complex circuit with thousands of transistors. Why does the Pentium have a circuit to multiply specifically by three? Why is it so complicated? In this article, I examine this multiplier—which I’ll call the ×3 circuit—and explain its purpose and how it is implemented.
"A calculator app? Anyone could make that."
https://chadnauseam.com/coding/random/calculator-app [chadnauseam.com]
2025-02-17 21:02
tags:
android
compsci
math
programming
ux
A calculator should show you the result of the mathematical expression you entered. That’s much, much harder than it sounds.
source: HN
Where Do Those Undergraduate Divisibility Problems Come From?
https://grossack.site/2025/01/16/undergrad-divisibility-problems.html [grossack.site]
2025-01-20 19:25
tags:
math
Oftentimes in your “intro to proofs” class or your first “discrete math” class or something similar, you’ll be shown problems of the form “prove that for is a multiple of for every ”… But where do these problems come from? And have you ever stopped to think how magical this is? If I gave you some random polynomial in and asked you if it always output multiples of , the answer would almost always be “no”! So if you really needed to come up with an example of this phenomenon, how would you do it? In this blog post, we give one approach!
source: HN
Optimality of Gerver's Sofa
https://arxiv.org/abs/2411.19826 [arxiv.org]
2025-01-04 17:52
tags:
math
paper
pdf
We resolve the moving sofa problem by showing that Gerver’s construction with 18 curve sections attains the maximum area.
source: trivium
AES-GCM and breaking it on nonce reuse
https://frereit.de/aes_gcm/ [frereit.de]
2024-12-04 23:58
tags:
article
crypto
exploit
math
random
security
In this post, we will look at how the security of the AES-GCM mode of operation can be completely compromised when a nonce is reused.
With Fifth Busy Beaver, Researchers Approach Computation’s Limits
https://www.quantamagazine.org/amateur-mathematicians-find-fifth-busy-beaver-turing-machine-20240702/ [www.quantamagazine.org]
2024-07-02 17:46
tags:
article
compsci
math
Today, the team declared victory. They’ve finally verified the true value of a number called BB(5), which quantifies just how busy that fifth beaver is. They obtained the result — 47,176,870 — using a piece of software called the Coq proof assistant, which certifies that mathematical proofs are free of errors.
source: HN
Randar: A Minecraft exploit that uses LLL lattice reduction to crack server RNG
https://github.com/spawnmason/randar-explanation/blob/master/README.md [github.com]
2024-04-19 01:22
tags:
gaming
java
math
opsec
programming
random
Every time a block is broken in Minecraft versions Beta 1.8 through 1.12.2, the precise coordinates of the dropped item can reveal another player’s location. “Randar” is an exploit for Minecraft which uses LLL lattice reduction to crack the internal state of an incorrectly reused java.util.Random in the Minecraft server, then works backwards from that to locate other players currently loaded into the world.
source: HN
Multiply - A Book About Calculators I Helped Create
https://benjamin.computer/posts/2022-08-17-calculators.html [benjamin.computer]
2024-03-15 20:07
tags:
book
design
hardware
math
retro
Now, by trade I’m a software engineer and a trainee scientist - I’ve never designed a book before. However, I’m no stranger to graphic design, having done a variety of things before now. But a book is a new proposition with different challenges. There was a lot of work ahead. But where to begin?
source: Dfly
How Good Are FiveThirtyEight Forecasts?
https://projects.fivethirtyeight.com/checking-our-work/ [projects.fivethirtyeight.com]
2023-05-19 16:30
tags:
factcheck
math
visualization
Here, we’re looking at two main things: the calibration of a forecast — that is, whether events that we said would happen 30 percent of the time actually happened about 30 percent of the time — and how our forecast compared with an unskilled estimate that relies solely on historical averages. We can answer those questions using calibration plots and skill scores, respectively.
A Cryptographic Near Miss
https://words.filippo.io/dispatches/near-miss/ [words.filippo.io]
2023-04-11 20:00
tags:
bugfix
crypto
go
math
security
Go 1.20.2 fixed a small vulnerability in the crypto/elliptic package. The impact was minor, to the point that I don’t think any application was impacted, but the issue was interesting to look at as a near-miss, and to learn from.
source: L
1 Billion is Tiny in an Alternate Universe: Introduction to p-adic Numbers
https://www.youtube.com/watch?v=3gyHKCDq1YA [www.youtube.com]
2023-03-11 08:22
tags:
math
video
The Unreasonable Effectiveness of JPEG: A Signal Processing Approach
https://www.youtube.com/watch?v=0me3guauqOU [www.youtube.com]
2022-05-08 03:26
tags:
compression
compsci
graphics
math
video
The JPEG algorithm is rather complex and in this video, we break down the core parts of the algorithm, specifically color spaces, YCbCr, chroma subsampling, the discrete cosine transform, quantization, and lossless encoding. The majority of the focus is on the mathematical and signal processing insights that lead to advancements in image compression and the big themes in compression as a whole that we can take away from it.
NaN Gates and Flip FLOPS
https://www.youtube.com/watch?v=5TFDG-y-EHs [www.youtube.com]
2022-05-01 22:19
tags:
compsci
hardware
math
programming
solder
video
A new kind of computer architecture that’s more elegant than 1s and 0s, being based directly on Mathematics.
Exponentially Better Rotations
https://thenumbat.github.io/Exponential-Rotations/ [thenumbat.github.io]
2022-04-19 02:58
tags:
gl
graphics
interactive
math
If you’ve done any 3D programming, you’ve likely encountered the zoo of techniques and representations used when working with 3D rotations. Some of them are better than others, depending on the situation.
source: HN
Emulating AMD Approximate Arithmetic Instructions On Intel
https://robert.ocallahan.org/2021/09/emulating-amd-rsqrtss-etc-on-intel.html [robert.ocallahan.org]
2021-09-13 04:29
tags:
cpu
debugging
math
programming
virtualization
Pernosco accepts uploaded rr recordings from customers and replays them with binary instrumentation to build a database of all program execution, to power an amazing debugging experience. Our infrastructure is Intel-based AWS instances. Some customers upload recordings made on AMD (Zen) machines; for these recordings to replay correctly on Intel machines, instruction execution needs to produce bit-identical results. This is almost always true, but I recently discovered that the approximate arithmetic instructions RSQRTSS, RCPSS and friends do not produce identical results on Zen vs Intel. Fortunately, since Pernosco replays with binary instrumentation, we can insert code to emulate the AMD behavior of these instructions. I just needed to figure out a good way to implement that emulation.
source: HN
The impossible chessboard puzzle
https://www.youtube.com/watch?v=wTJI_WuZSwE [www.youtube.com]
2021-03-25 22:55
tags:
compsci
math
video
Bit strings, error correcting, and coloring the corners of higher dimensional cubes.
Recovering A Full Pem Private Key When Half Of It Is Redacted
https://blog.cryptohack.org/twitter-secrets [blog.cryptohack.org]
2021-03-25 02:26
tags:
crypto
math
opsec
programming
security
The @CryptoHack__ account was pinged today by ENOENT, with a CTF-like challenge found in the wild: Source tweet. Here’s a write-up covering how given a partially redacted PEM, the whole private key can be recovered. The Twitter user, SAXX, shared a partially redacted private RSA key in a tweet about a penetration test where they had recovered a private key. Precisely, a screenshot of a PEM was shared online with 31 of 51 total lines of the file redacted. As ENOENT correctly identified, the redaction they had offered wasn’t sufficient, and from the shared screenshot, it was possible to totally recover the private key.
source: L
What are the most important statistical ideas of the past 50 years?
http://www.stat.columbia.edu/~gelman/research/unpublished/stat50.pdf [www.stat.columbia.edu]
2021-03-12 03:30
tags:
ideas
math
paper
pdf
science
We argue that the most important statistical ideas of the past half century are: counterfactual causal inference, bootstrapping and simulation-based inference, overparameterized models and regularization, multilevel models, generic computation algorithms, adaptive decision analysis, robust inference, and exploratory data analysis. We discuss common features of these ideas, how they relate to modern computing and big data, and how they might be developed and extended in future decades. The goal of this article is to provoke thought and discussion regarding the larger themes of research in statistics and data science.
source: danluu
donut.c without a math library
https://www.a1k0n.net/2021/01/13/optimizing-donut.html [www.a1k0n.net]
2021-01-20 05:39
tags:
c
math
programming
My little donut.c has been making the rounds again, after being featured in a couple YouTube videos (e.g., Lex Fridman and Joma Tech). If I had known how much attention this code would get over the years, I would have spent more time on it.