ARMv8 SHA256 instructions implementation in C
☆30Apr 28, 2016Updated 9 years ago
Alternatives and similar repositories for sha256-armv8
Users that are interested in sha256-armv8 are comparing it to the libraries listed below
Sorting:
- AArch64cryptolib is a from scratch implementation of cryptographic primitives aiming for optimal performance on Arm A-class cores☆43May 27, 2025Updated 9 months ago
- @cdzombak's dotfiles, configurations, and system setup scripts☆21Updated this week
- A lightweight IPC mechanism☆13Mar 29, 2016Updated 9 years ago
- Chaitin-Briggs register-allocation algorithm (LLVM back-end)☆12Jan 6, 2016Updated 10 years ago
- PCB files for Adafruit E-Paper Display Breakouts☆12Feb 7, 2024Updated 2 years ago
- Read only mirror for Hafnium☆22Mar 3, 2026Updated 2 weeks ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago
- ☆11Sep 12, 2022Updated 3 years ago
- Performance Counters for Apple Silicon on macOS☆20Jan 9, 2022Updated 4 years ago
- Inter-procedural analysis framework and dependency/information-flow analysis for LLVM☆19Mar 2, 2013Updated 13 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- Project to build and test seL4 for many different platforms☆17Updated this week
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- SHA-1, SHA-256 and SHA-512 compression functions using Intel, ARMv8 and Power8 SHA intrinsics☆221Jan 8, 2026Updated 2 months ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- SGX protected filesystem demo☆12Jul 28, 2017Updated 8 years ago
- linux-exploit☆14Jun 12, 2019Updated 6 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Example Jop and Rop attack at Arm aarch64 platform☆10Sep 8, 2020Updated 5 years ago
- Work space for golang.org/x/perf version 2☆20Nov 14, 2020Updated 5 years ago
- Chinese Version of ZeroNet Documentation☆13Jul 14, 2017Updated 8 years ago
- diablo is an Out-Of-Order 64-bit RISC-V processor.☆16Sep 1, 2023Updated 2 years ago
- ☆16Sep 29, 2022Updated 3 years ago
- Hacks and experiments for the linux kernel VM subsystem.☆23Jun 4, 2022Updated 3 years ago
- The vOW4SIKE project provides C code that implements the parallel collision search algorithm by van Oorschot and Wiener (vOW). The algori…☆12May 25, 2021Updated 4 years ago
- ☆12Mar 6, 2026Updated 2 weeks ago
- Mirror of my Go Kyber implementation.☆16May 30, 2018Updated 7 years ago
- Computer network related concepts and tools☆11Mar 21, 2021Updated 5 years ago
- CPU/GPU miner in c for bitcoin☆25Nov 13, 2012Updated 13 years ago
- ☆11Sep 13, 2025Updated 6 months ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- Constant-time choose between two variables in Clang/LLVM☆20Apr 14, 2018Updated 7 years ago
- A glibc compatibility layer package for Alpine Linux (arm64)☆11Jan 10, 2020Updated 6 years ago
- Bottom-up memory-safety for assembly language using symbolic execution☆17Feb 19, 2026Updated last month
- 计网GBN实验(加流量窗)☆10Dec 3, 2014Updated 11 years ago
- TLS in Rust (eventually)☆21Mar 12, 2013Updated 13 years ago
- A taint tracing plugin for Valgrind, unofficial mirror for https://code.google.com/p/flayer/☆16Aug 5, 2015Updated 10 years ago
- Linux eventfd explained☆16Nov 12, 2018Updated 7 years ago
- 青衫Neuro网站 | Qing Shan Neuro Website 🌍☆14Mar 15, 2026Updated last week