| Home Page |
CUDA:
Reports on my work with Parallel Java (PJ):
Reports on my work with Many-to-Many Invocation (M2MI):
Cryptography:
|
The evolution of Wolfram's "Rule 30" cellular automaton,
proposed as a stream cipher keystream generator |
For an advanced research seminar on Java Virtual Machine internals:
| Home Page |