DEV Community

dima853 profile picture

dima853

crypto & security backend

Location Russia Joined Joined on  Personal website https://github.com/dima853 github website
MAMR vs HAMR: The Battle for the Future of hard Drives

MAMR vs HAMR: The Battle for the Future of hard Drives

10
Comments 1
11 min read

Want to connect with dima853?

Create an account to connect with dima853. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
An overview of the security of lower-level TCP/IP protocols

An overview of the security of lower-level TCP/IP protocols

10
Comments 2
3 min read
Introduction to DDD || Eric Evans

Introduction to DDD || Eric Evans

10
Comments 1
3 min read
Knowledge Extraction in Domain-Driven Design || DDD Eric Evans

Knowledge Extraction in Domain-Driven Design || DDD Eric Evans

10
Comments 1
3 min read
2.3 ARCHITECTURES VERSUS MIDDLEWARE

2.3 ARCHITECTURES VERSUS MIDDLEWARE

10
Comments
3 min read
3.1 Prediction methods for conditional jumps

3.1 Prediction methods for conditional jumps

10
Comments
6 min read
Branch prediction (all processors)

Branch prediction (all processors)

10
Comments
4 min read
2.2.3 Hybrid Architectures (Distributed Systems)

2.2.3 Hybrid Architectures (Distributed Systems)

11
Comments
3 min read
3.4 Stronger Security Notions (Introduction to Modern Cryptography Jonathan Katz and Yehuda Lindell)

3.4 Stronger Security Notions (Introduction to Modern Cryptography Jonathan Katz and Yehuda Lindell)

12
Comments 1
3 min read
2.2.2 Decentralized Architectures (Distributed Systems)

2.2.2 Decentralized Architectures (Distributed Systems)

10
Comments 1
10 min read
2.2 SYSTEM ARCHITECTURES / 2.2.1 Centralized Architectures (Distributed Systems)

2.2 SYSTEM ARCHITECTURES / 2.2.1 Centralized Architectures (Distributed Systems)

15
Comments
7 min read
2.1 ARCHITECTURAL STYLES (Distributed Systems)

2.1 ARCHITECTURAL STYLES (Distributed Systems)

20
Comments 2
5 min read
Create AES on C/JAVA || SubBytes / ShiftRows / Vulnerabilities (second part)

Create AES on C/JAVA || SubBytes / ShiftRows / Vulnerabilities (second part)

20
Comments 1
6 min read
Create AES on C/JAVA || Forward S-box (first part)

Create AES on C/JAVA || Forward S-box (first part)

20
Comments 2
4 min read
Forget Complex Algorithms: The One, One-and-Two, Multiple Pass Solution is Here!

Forget Complex Algorithms: The One, One-and-Two, Multiple Pass Solution is Here!

21
Comments
3 min read
loading...