About:

Kamila Szewczyk is a programmer and student interested in compilers, data compression, and history, with hobbies in chess and music.

Website:

Specializations:

Interests:

Compiler construction Data compression Esoteric languages Statistics Numerical algorithms Low level development Performance optimisation Early modern history Surgical medicine Chess Music Typesetting Writing Linguistics

Incoming Links:

Subscribe to RSS:
The Sophie Germain Prime Project aims to collect, analyze, and distribute Sophie Germain primes for research on cryptographic algorithms. Users can submit primes to be verified and stored in a database, and the project provides a ...
The text provides an overview of the Blum-Blum-Shub (BBS) pseudorandom number generator, its internal state step function, quadratic residues, and the security implications of the generator. It discusses the assumptions and requir...
The author explains why they choose to implement codecs in C instead of Rust. They discuss the advantages of Rust's trait system and ownership model, but ultimately find that Rust is not suitable for implementing low-level perform...
The text discusses the computational complexity of sorting algorithms based on comparisons, focusing on the heap sort and quicksort algorithms. It also introduces the radix sort algorithm and compares its performance with other so...
The text is a retrospective and a lab notebook of the author's research on coding theory and information theory. It discusses Reed-Solomon codes, Goppa codes, and their applications to cryptography. The author also shares the chal...
The author ordered a Model F keyboard, had to change the order to get the F keys, and received it promptly. Assembling the keyboard was simpler than expected, but there were difficulties with inserting the keycaps. The keys feel l...
The text discusses a cryptographic algorithm based on the NP-hard problem of polynomial reconstruction. The author warns against deploying the program into production due to potential security vulnerabilities. The algorithm involv...
The text discusses the challenges of quantifying the speed of different language runtimes and the importance of measuring the constant overhead of a programming language runtime. It outlines the methodology for benchmarking and th...
The text discusses the importance of file type detection and segmentation for efficient data compression. It focuses on Lempel-Ziv factorization and its application in detecting executable content. The author also presents results...
The blog post discusses the concept of code golf, which is a recreational computer programming activity where participants aim to write the shortest possible program to accomplish a task. It delves into the information theoretic b...
The article discusses the preliminaries of polygon triangulation using the APL programming language. It explains the concept of triangulation, its applications, and the methods for unconstrained and constrained triangulation.
The blog post presents an alternative derivation of Shannon entropy based on advancements in coding theory. It introduces the Shannon entropy of a message ensemble and discusses the Kraft-McMillan inequality. The post also explain...
Rice's theorem states that non-trivial semantic properties of a program are undecidable, while the Rice-Shapiro theorem demonstrates that finitary properties are recursively enumerable. The theorems are named after Henry Gordon Ri...
The text discusses the link between Fibonacci numbers and primes. It explains the definition of Fibonacci numbers, Binet's formula, generating functions, and various properties of Fibonacci numbers. It also covers divisibility, pr...
The blog post discusses Heaviside's method for partial fraction decomposition of rational functions, which is important for various computations including antiderivatives, Taylor series expansions, and inverse Laplace transforms. ...
The text is about Dan Baronet, an APL programmer at Dyalog Ltd., who was known for his unconventional and ingenious utilization of APL primitive functions. The text includes anecdotes about Dan's personality and habits, as well as...
The blog post discusses the invention of the steam-powered apparatus known as an aeolipile by the renowned Greek mathematician and engineer Hero of Alexandria. It highlights the significance of Hero's contributions to modern pneum...
The text discusses a curious problem of grouping numbers and finding the minimum average. It explores the solution to the original puzzle, the range from 1 to nn, and the open question of nested groups. The author uses Dyalog APL ...
The text provides an introduction to the λ calculus, explaining its system for expressing computation and the operations commonly performed on λ terms. It also discusses the implementation of the λ-calculus evaluator, including le...
The author discusses the inefficiencies of the ent utility and the issues associated with the way it is built. They re-wrote ent from scratch, preserving the same command-line interface, messages, and feature list. The main issues...
The text introduces Subleq, an one instruction computer where every instruction performs the operation of subtracting and branching if a value is less or equal than zero. It explains the logic and synthesizing instructions of Subl...
The text explains the computation of infinite sums of rational functions. It discusses the convergence of rational functions, the use of Euler's identity, and a conjecture related to rational functions. It also demonstrates the co...
The author shares a solution for embedding resources into SDL2 applications, which is convenient for small applications. The post discusses asset types, the build system, generating the C source, source code, and compression.
The third post of the ELF file infection series addresses unresolved issues from the second post, including the spreading mechanism, payload, and conclusion of the ELF infector.