Multiplying... backward?
☆14Jul 22, 2020Updated 5 years ago
Alternatives and similar repositories for backward_multiplication
Users that are interested in backward_multiplication are comparing it to the libraries listed below
Sorting:
- Bloom filter alternative (C++)☆18Nov 8, 2018Updated 7 years ago
- Fast 64 bit evolved hash.☆34Apr 4, 2017Updated 8 years ago
- Statistics about data (cardinality estimation, frequent item detection, approximate counting,...)☆16Jun 21, 2022Updated 3 years ago
- Fast algorithms for computing XX^T for binary matrices☆14Sep 24, 2019Updated 6 years ago
- ☆14Nov 5, 2018Updated 7 years ago
- Parallel boolean circuit evaluation☆26Oct 28, 2018Updated 7 years ago
- A small DFA for under 16 states☆54Jun 6, 2018Updated 7 years ago
- Detailed experiments over simdjson for VLDB article (2019) and future work☆20Oct 3, 2020Updated 5 years ago
- Experimental JFR parser☆46Updated this week
- Several variations of a dot product benchmark.☆11Dec 10, 2012Updated 13 years ago
- Reproducible experimeents on UTF-8 validation using SIMD instructions☆41Aug 21, 2024Updated last year
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 3 months ago
- Deterministic Acyclic Finite State Automaton implementation for morphological analysis☆18Dec 17, 2020Updated 5 years ago
- Vanitygen plus! Generate vanity address for 80+ cryptocoins including: BTC, LTC, LBRY, UNO, DASH, DOGE, FEATHER, GROESTL, MONA, PEERCOIN,…☆13Feb 7, 2017Updated 9 years ago
- Roaring Bitmaps for D☆11Dec 15, 2018Updated 7 years ago
- A C++ class that adds arbitrary precision integers aimed at high performance and ease of use. All you need to do is replace int with huge…☆12Mar 6, 2024Updated 2 years ago
- Изучение C++ и алгоритмов CV на спец. курсе для 11 классов ФМЛ №239☆10Sep 5, 2024Updated last year
- Read HotSpot perf counters directly from the JVM memory☆36Mar 23, 2023Updated 3 years ago
- C library for ECC-SM2 public encrypt☆10Dec 17, 2016Updated 9 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- ☆30Jan 24, 2022Updated 4 years ago
- Shuffle-based predicate matcher and all-round branch free swiss army chainsaw☆17Jun 5, 2018Updated 7 years ago
- JFR to Firefox Profiler converter☆18Apr 12, 2024Updated last year
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆10Oct 29, 2019Updated 6 years ago
- ☆32Apr 13, 2022Updated 3 years ago
- Bitcoin private key brute force written in Python☆11Aug 22, 2022Updated 3 years ago
- Brute force Bitcoin Public keys for puzzles.☆12Dec 24, 2021Updated 4 years ago
- A beginner's guide to computer programming (2006)☆12Aug 10, 2018Updated 7 years ago
- PoC implementation of Gallois Field, Paillier, DSA, ECDSA, and curve secp256k1 with an adapted scheme of "Two-party generation of DSA si…☆13Feb 5, 2018Updated 8 years ago
- Elliptic Curve Cryptography☆13Mar 23, 2010Updated 15 years ago
- POSTECH: Heterogeneous Parallel Computing (Fall 2023)☆19Dec 9, 2023Updated 2 years ago
- Production-ready Java implementation of the Xor Filter.☆18Jan 23, 2020Updated 6 years ago
- Lightning-fast Regular Expressions for Java☆18Sep 19, 2022Updated 3 years ago
- Agent to detect type pollution due to instanceof/checkcast misuses☆36Nov 11, 2022Updated 3 years ago
- A project to facilitate construction of high-performance neural simulations.☆32Jul 3, 2021Updated 4 years ago
- A libpcap-based network activity visualizer / playground for learning d3 and Rust.☆17Mar 6, 2019Updated 7 years ago
- Basic Arithmetic or Advanced Cryptographic Protocols, SECP256k2 Provides the Essential Functions Needed for Modern Cryptography Generatin…☆10Jul 30, 2024Updated last year
- Library for elliptic curve (ECDSA) private keys, public keys, and bitcoin addresses.☆14Mar 11, 2025Updated last year
- A SpotBugs plugin that detects bad practices on JMH microbenchmarks.☆11Jul 10, 2019Updated 6 years ago