wereHamster / sha256-sse
SSE optimized version of SHA256, doing four blocks in parallel
☆24Updated 14 years ago
Alternatives and similar repositories for sha256-sse:
Users that are interested in sha256-sse are comparing it to the libraries listed below
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 6 years ago
- BLAKE2 AVX2 implementations☆23Updated 5 years ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆99Updated 7 years ago
- A tiny implementation of SHA-3, SHAKE, Keccak, and sha3sum☆98Updated 4 years ago
- Implementations of a fast Elliptic-curve Digital Signature Algorithm☆173Updated 4 years ago
- Performance Evaluation of SHA-256 using SHA New Instructions.☆42Updated 3 years ago
- AES-GCM-SIV implementations (128 and 256 bit)☆113Updated 5 years ago
- C library providing BLAKE2b, BLAKE2s, BLAKE2bp, BLAKE2sp☆133Updated last year
- Zerocoin: C++ lib for anonymous extension to bitcoin☆177Updated 4 years ago
- C implementation of Elligator 2 for Curve25519☆31Updated 3 years ago
- ☆276Updated last month
- Compute bitcoin Merkle trees on your GPU☆32Updated 4 years ago
- An implementation of Mike Hamburg's Ed448 (Goldilocks) curve - derived from libdecaf. This is a mirror of https://bugs.otr.im/otrv4/libgo…☆18Updated 4 years ago
- mirror of djb's "NaCl: Networking and Cryptography library"☆49Updated 13 years ago
- Password Hashing Competition Submissions☆70Updated 10 years ago
- Equihash: memory-hard PoW with fast verification☆129Updated 8 years ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Updated 8 months ago
- CRYPTOGAMS distribution repository☆56Updated 2 months ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- Optimized implementations of Poly1305, a fast message-authentication-code☆44Updated 9 years ago
- Equihash solver port from C++ to C for Zcash☆33Updated 7 years ago
- Implementation of Shamir's Secret Sharing in C☆64Updated 6 months ago
- Optimized Binary GCD for Modular Inversion☆41Updated 4 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆10Updated 5 years ago
- very fast (NOT SECURE) implementation of arithmetic on curve secp256k1 on x86_64☆23Updated 4 years ago
- An implementation for fair auditing and contingent payments in Bitcoin☆23Updated 7 years ago
- Fast constant-time AES implementations on 32-bit architectures☆63Updated 3 months ago
- A clean & simple implementation of BLAKE2b and BLAKE2s hash functions -- written while writing the RFC.☆18Updated 9 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆11Updated last year
- Haraka is a secure and efficient short-input hash function.☆54Updated 7 years ago