elly/blog

How Does JIT Work?
2022-05-05, 3975 words
compilers, virtual-machines
IRC Client Design Thoughts
2022-04-18, 1274 words
irc, networking
Cypherpunks, Mixmaster, and Mixminion: Anonymous Email
2022-02-09, 2618 words
cryptography, privacy
Book Review: A Psalm For The Wild-Built
2022-02-01, 387 words
me, book
ChaCha20, in AMD64 Assembly
2022-01-26, 1657 words
cryptography, asm
The PPM Image Format
2022-01-24, 1091 words
unix, data-structures
Backups
2022-01-18, 1058 words
me, shell
Shellballs and Self-Extractors
2022-01-13, 1653 words
unix, history, shell
The m4 Macro Processor
2022-01-05, 1263 words
unix, history
Tarballs
2022-01-03, 2649 words
unix, history
Whence autoconf?
2022-01-02, 3452 words
unix, history
Constant-Time Operations
2022-01-01, 1125 words
cryptography
The Shunting-Yard Algorithm
2021-12-31, 1938 words
computer-science, c
The Boyer-Moore String Search Algorithm
2021-12-30, 1317 words
computer-science, c
Virtual Machines, Part 1: Instruction Encoding
2021-12-29, 1628 words
software, virtual-machines
Length Extension Attacks on MD-Type Hash Functions
2021-12-28, 1544 words
cryptography
Virtual Machines, Part 0: The Basics
2021-12-24, 1543 words
software, c, virtual-machines
My Homedir Layout
2021-10-06, 201 words
software, me
Pinebook First Experiences
2021-06-01, 323 words
software, me
Merkle Trees
2020-09-12, 944 words
cryptography, computer-science, data-structures
Lamport Signatures
2020-09-12, 1036 words
cryptography, computer-science
Broadcast Buffers
2020-09-10, 527 words
computer-science, data-structures
Boring Protocols
2020-09-07, 1859 words
cryptography
The C++ Static Constructor Registration Technique
2019-11-16, 691 words
c++
Linda Tuple Spaces
2019-11-15, 1099 words
computer-science, data-structures
An ed(1) Tutorial
2015-10-03, 1479 words
software, unix
How To Get Along With People
2015-09-29, 89 words
etiquette, core-skills
Writing a Linux Userland
2015-05-18, 1302 words
systems-hacking, linux, c