{"id":866,"date":"2011-10-02T21:03:00","date_gmt":"2011-10-02T19:03:00","guid":{"rendered":"http:\/\/cerezo.name\/blog\/?p=866"},"modified":"2024-10-14T14:11:37","modified_gmt":"2024-10-14T12:11:37","slug":"assorted-links-7","status":"publish","type":"post","link":"https:\/\/cerezo.name\/blog\/2011\/10\/02\/assorted-links-7\/","title":{"rendered":"Assorted Links"},"content":{"rendered":"<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li><a href=\"http:\/\/www.educatedguesswork.org\/2011\/09\/security_impact_of_the_rizzodu.html\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Security impact of the Rizzo\/Duong <span class=\"caps\">CBC<\/span> \u201c<span class=\"caps\">BEAST<\/span>\u201d attack<\/a>: one of the <span class=\"caps\">SSL<\/span> protocol authors on the <a href=\"http:\/\/vnhacker.blogspot.com\/2011\/09\/beast.html\" target=\"_blank\" rel=\"noopener\"><span class=\"caps\">BEAST<\/span><\/a> attack<\/li>\n<li><a href=\"http:\/\/css.csail.mit.edu\/cryptdb\/\" target=\"_blank\" rel=\"noopener\">CryptDB<\/a>, with an implementation coming soon<\/li>\n<li>Insights on the evolution of computational complexity on <a href=\"http:\/\/blog.computationalcomplexity.org\/2011\/09\/where-do-theorems-go-to-die.html\" target=\"_blank\" rel=\"noopener\">Where do theorems go to&nbsp;die?<\/a><\/li>\n<li><a href=\"http:\/\/drdobbs.com\/high-performance-computing\/231500166\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Running <span class=\"caps\">CUDA<\/span> Code Natively on x86 Processors<\/a><\/li>\n<li><a href=\"http:\/\/sydneyalgorithms.wordpress.com\/2011\/08\/16\/complexity-of-and-algorithms-for-borda-manipulation-nina-narodystska\/\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Complexity of and Algorithms for Borda Manipulation<\/a><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Security impact of the Rizzo\/Duong <span class=\"caps\">CBC<\/span> \u201c<span class=\"caps\">BEAST<\/span>\u201d attack: one of the <span class=\"caps\">SSL<\/span> protocol authors on the <span class=\"caps\">BEAST<\/span> attack CryptDB, with an implementation coming soon Insights on the evolution of computational complexity on Where do theorems go to&nbsp;die? Running <span class=\"caps\">CUDA<\/span> Code Natively on x86 Processors Complexity of and Algorithms for Borda Manipulation<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"wp_typography_post_enhancements_disabled":false,"ngg_post_thumbnail":0},"categories":[18],"tags":[],"_links":{"self":[{"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/866"}],"collection":[{"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/comments?post=866"}],"version-history":[{"count":3,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/866\/revisions"}],"predecessor-version":[{"id":1626,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/866\/revisions\/1626"}],"wp:attachment":[{"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/media?parent=866"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/categories?post=866"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/tags?post=866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}