pooler
|
d4dddcb113
|
Exploit constants in SHA-256d
|
2012-03-30 00:40:41 +02:00 |
|
pooler
|
8c19b40b24
|
Avoid unnecessary computations in SHA-256d on x86-64
|
2012-03-26 14:15:35 +02:00 |
|
pooler
|
9fd497db5e
|
Skip the last three rounds of SHA-256d
|
2012-03-25 15:43:49 +02:00 |
|
pooler
|
18a34a72ab
|
Precompute the first few SHA-256d rounds
|
2012-03-24 01:27:23 +01:00 |
|
pooler
|
e52982ab7f
|
Drop unused 2-way scrypt
|
2012-03-23 16:35:21 +01:00 |
|
pooler
|
8af4ed77e6
|
Enable AVX optimizations in SHA-256 for scrypt
|
2012-03-22 17:38:35 +01:00 |
|
pooler
|
ed3d1c94f9
|
Reimplement SHA-256d
|
2012-03-21 23:07:56 +01:00 |
|
pooler
|
b961766f4d
|
Move SHA-2 code to separate files
|
2012-03-12 13:32:11 +01:00 |
|