Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2016-05-01 | Reset bogus executable permissions | David Foerster | 1 | -0/+0 | |
2016-02-21 | Crypto: update Whirlpool implementation using latest code from Crypto++. | Mounir IDRASSI | 1 | -1/+1 | |
2016-01-11 | MacOSX: use native OSX byte swapping routines used in hash functions to ↵ | Mounir IDRASSI | 1 | -3/+10 | |
improve speed. | |||||
2016-01-03 | Windows: use compiler intrinsic for some functions used in cryptographic ↵ | Mounir IDRASSI | 1 | -0/+10 | |
primitives to ensure maximum performance. | |||||
2015-12-31 | Cryptography: Optimize Whirlpool implementation by using public domain ↵ | Mounir IDRASSI | 1 | -0/+132 | |
assembly code developed by Wei Dai |