dima853

dima853 @dima853

About: crypto & security backend

Location:
Russia
Joined:
Nov 17, 2024

dima853
articles - 20 total

2.3.2 - 2.3.5 Concepts (System Performance Brendan Gregg 2nd)

2.3.3 Trade-Offs Trade-offs in IT: "Pick two" and performance...

Learn More 10 0Jul 11

2.2 - 2.3.2 Models/Concepts (System Performance Brendan Gregg 2nd)

2.2 Models 2.2.1 System Under Test It is important to consider the impact of...

Learn More 10 0Jul 11

MAMR vs HAMR: The Battle for the Future of hard Drives

Taking apart MAMR: Why hasn't this technology taken over the HDD world yet? 1....

Learn More 10 1Jun 19

An overview of the security of lower-level TCP/IP protocols

Introduction This section examines the protocols at the lower levels of the TCP/IP stack,...

Learn More 10 2Jun 5

Introduction to DDD || Eric Evans

Summary: Domain Models in software development 1. Models as a simplification of...

Learn More 10 1May 26

Knowledge Extraction in Domain-Driven Design || DDD Eric Evans

Summary: Knowledge Extraction in Domain-Driven Design (Chapter 1) 1. Problem:...

Learn More 10 1May 26

2.3 ARCHITECTURES VERSUS MIDDLEWARE

The role of Middleware in distributed systems Architectural Styles and Middleware...

Learn More 10 0May 17

3.1 Prediction methods for conditional jumps

1. What is a saturating 2-bit counter? This is a two-bit saturation counter, which is used...

Learn More 10 0May 8

Branch prediction (all processors)

Document - https://www.agner.org/optimize/microarchitecture.pdf The pipeline in a modern...

Learn More 10 0May 4

2.2.3 Hybrid Architectures (Distributed Systems)

1. Introduction to Hybrid Architectures Hybrid architectures combine elements of...

Learn More 11 0May 2

3.4 Stronger Security Notions (Introduction to Modern Cryptography Jonathan Katz and Yehuda Lindell)

3.4.1 Security for Multiple Encryptions Simple experiment, obviously that This...

Learn More 12 1May 2

2.2.2 Decentralized Architectures (Distributed Systems)

Before we begin, notice: Multitiered client-server architectures are a direct consequence of...

Learn More 10 1Apr 29

2.2 SYSTEM ARCHITECTURES / 2.2.1 Centralized Architectures (Distributed Systems)

Obviously, that: Deciding on software components, their interaction, and their placement leads an...

Learn More 15 0Apr 27

2.1 ARCHITECTURAL STYLES (Distributed Systems)

Before we begin, let's read this excerpt from the book. Distributed systems are often complex...

Learn More 20 2Apr 26

Create AES on C/JAVA || SubBytes / ShiftRows / Vulnerabilities (second part)

1 part - https://dev.to/dima853/create-aes-on-cjava-forward-s-box-first-part-4lef 1....

Learn More 20 1Apr 26

[Boost]

Create AES on C/JAVA || Forward S-box (first part) ...

Learn More 5 0Apr 26

Create AES on C/JAVA || Forward S-box (first part)

part 2 -...

Learn More 20 2Apr 25

The One, One-and-Two, Multiple Pass Algorithms

Forget Complex Algorithms: The One, One-and-Two, Multiple Pass...

Learn More 0 0Apr 22

[Boost]

Forget Complex Algorithms: The One, One-and-Two, Multiple Pass...

Learn More 0 0Apr 22

Forget Complex Algorithms: The One, One-and-Two, Multiple Pass Solution is Here!

Alright, folks! Let’s talk about algorithm efficiency, but in a way that won’t make your brain melt...

Learn More 19 0Apr 21