vkrasnov / vpmaddLinks
Multiplication using AVX512 and AVX512IFMA instructions
☆23Updated 9 years ago
Alternatives and similar repositories for vpmadd
Users that are interested in vpmadd are comparing it to the libraries listed below
Sorting:
- A small DFA for under 16 states☆51Updated 7 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- RLU resizable hash-table☆17Updated 9 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- A software-based Ethernet switch design built around a memory-efficient, high-performance, and highly-concurrent hash table for compact a…☆36Updated 9 years ago
- reverse engineering branch predictors☆17Updated 9 years ago
- ssmem is a simple object-based memory allocator with epoch-based garbage collection☆34Updated 9 years ago
- I-cache line packing and branch misprediction measuring tool☆18Updated 8 years ago
- measure entropy of memory allocators☆12Updated 3 years ago
- SIMD recipes, for various platforms (collection of code snippets)☆49Updated 4 years ago
- Sample program for article "SIMD-ized searching in unique constant dictionary" (http://0x80.pl/articles/simd-search.html)☆52Updated 8 years ago
- Quick sort code using AVX2 instructions☆69Updated 8 years ago
- Wait-Free Eras (PPoPP '20)☆10Updated 5 years ago
- Some variations on Lemire's Fast Random Integer Generation in an Interval☆15Updated 5 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- Freud, a tool to create Performance Annotations for C/C++ programs☆21Updated 11 months ago
- pspgen utility on top of DPDK☆14Updated 9 years ago
- Sheriff consists of two tools: Sheriff-Detect, a false-sharing detector, and Sheriff-Protect, a false-sharing eliminator that you can lin…☆32Updated 7 years ago
- Scripts that I used to write a blog post about section 7.24.1(2) of C11☆11Updated 9 years ago
- SIMDized check which bytes are in a set☆28Updated 6 years ago
- Fine-grained frequency and voltage transition tests☆20Updated 2 years ago
- Extended Roofline Model - LLVM source tree with additional libraries for the analysis of the dynamic execution in the interpreter☆17Updated 8 years ago
- Programatically obtain information about the pages backing a given memory region☆78Updated 3 years ago
- Restartable Sequences: a userspace implementation of cheap per-cpu atomic operations☆36Updated 6 years ago
- C library to compute the Hamming weight of arrays☆48Updated 6 years ago
- Compact tries for fixed-width keys☆26Updated 7 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆45Updated 10 years ago
- Oblivious Memory Access under Fully Homomorphic Encryption☆13Updated 9 years ago
- C version of the MetroHash function☆27Updated 10 years ago
- Predator: Predictive False Sharing Detection☆21Updated 11 years ago