wereHamster / sha256-sseView external linksLinks
SSE optimized version of SHA256, doing four blocks in parallel
☆25Sep 22, 2010Updated 15 years ago
Alternatives and similar repositories for sha256-sse
Users that are interested in sha256-sse are comparing it to the libraries listed below
Sorting:
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆20Jan 1, 2026Updated last month
- ☆16Mar 23, 2022Updated 3 years ago
- APEX Deployment Tool☆12Feb 2, 2026Updated 2 weeks ago
- An eBPF kernel Observable Agent To Spy Performance Issue On OS.☆13Oct 31, 2025Updated 3 months ago
- Discontinued, replaced by CashDB☆29Jan 7, 2019Updated 7 years ago
- Example on how to read registers of the Nordic nRF24l01+ radio through SPI on USCI_B of MSP430G2553☆17Mar 12, 2012Updated 13 years ago
- ☆10Mar 4, 2024Updated last year
- ☆10Nov 16, 2023Updated 2 years ago
- Sackerel is integration tool of Mackerel and SakuraCloud☆10Feb 12, 2018Updated 8 years ago
- Benchmarks of all public available SNARK/STARK keccak circuits☆13Oct 1, 2023Updated 2 years ago
- ☆12Oct 15, 2016Updated 9 years ago
- AnyEvent based non-blocking PSGI web server (like Thin)☆104Jan 21, 2021Updated 5 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- MIP21 example☆15Jun 20, 2022Updated 3 years ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 2 years ago
- QueueIT Cloudfront Connector (Known User Implementation v.3.x for Cloudfront)☆10Jul 11, 2025Updated 7 months ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆47Feb 6, 2015Updated 11 years ago
- DataDog agent check for Linux Conntrack metrics☆10Feb 1, 2019Updated 7 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- Nakasendo SDK installed on a CentOS container - Only supports c++ for now☆11Nov 4, 2019Updated 6 years ago
- Kubernetes cloud-controller-manager for SAKURA CLOUD (alpha)☆12Oct 23, 2019Updated 6 years ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- One Mojolicious app to rule them all☆12May 2, 2022Updated 3 years ago
- ☆22Apr 7, 2015Updated 10 years ago
- Convex optimization for fun and profit.☆11Jan 12, 2022Updated 4 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Avalon ASIC extras☆30May 13, 2019Updated 6 years ago
- AWS Lambda powered drop-in replacement for ImageMagick convert command line tool☆11Oct 25, 2025Updated 3 months ago
- Asynchronous functions made funky!☆17Sep 8, 2011Updated 14 years ago
- tq is a command-line TOML processor.☆12Dec 28, 2015Updated 10 years ago
- ☆10Apr 14, 2016Updated 9 years ago
- ☆12Sep 26, 2024Updated last year
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- Tools to help golang projects audit dependencies, check licenses, and create bill-of-materials☆16Jul 31, 2017Updated 8 years ago
- gnome-terminal with automatic copy on selection and paste with right button☆11Jun 4, 2021Updated 4 years ago
- ☆10Dec 10, 2024Updated last year
- concurrent map implementation using bucket list like a skip list.☆10May 29, 2022Updated 3 years ago
- 5Degrees Protocol Core☆11May 7, 2022Updated 3 years ago