jedisct1 / siphash-avx2
SipHash AVX2 implementation in C
☆15Updated 8 years ago
Alternatives and similar repositories for siphash-avx2:
Users that are interested in siphash-avx2 are comparing it to the libraries listed below
- Optimized implementations of Poly1305, a fast message-authentication-code☆44Updated 9 years ago
- Optimized block functions for the ChaCha stream cipher☆49Updated 4 years ago
- Heap priority queue written in C, licensed under a BSD license☆32Updated 10 years ago
- C version of the MetroHash function☆25Updated 9 years ago
- SSE string functions for x86-64 Linux☆20Updated 2 years ago
- AVX-512 utilities☆18Updated 10 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 7 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- Authenticated Blowfish-encrypted pipe☆23Updated 6 years ago
- Integer arithmetic with overflow detection☆71Updated 10 years ago
- Standalone implemention of authenticated encryption algorithms☆11Updated 2 years ago
- Helper library for parsing valid/invalid/broken/malformed DNS packets☆16Updated 3 years ago
- A streaming implementation of SipHash in C as well as an optimized one-pass implementation.☆27Updated 12 years ago
- An overlay that verifies signed ELF binaries☆9Updated 9 years ago
- Easy, flexible C unit testing☆11Updated 8 years ago
- A clang wrapper for musl C library. Pretty hacky, I know.☆34Updated 9 years ago
- Automatically exported from code.google.com/p/libhhash☆32Updated 9 years ago
- A fast secure userspace pseudorandom number generator☆82Updated 10 years ago
- iomux - High performance aynchronous I/O multiplexing and timers☆14Updated 9 years ago
- ☆20Updated 9 years ago
- Mirror of libslz☆34Updated 5 years ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆26Updated 8 years ago
- Source code for the article "A bug story: data alignment on x86"☆15Updated 8 years ago
- Plug-and-play IP rate limiter in C☆24Updated 4 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- Lightweight cryptographic hash functions (reference code)☆15Updated 10 years ago
- Branchless UTF-8 decoder☆33Updated 7 years ago
- Multiplication using AVX512 and AVX512IFMA instructions☆23Updated 9 years ago