-
We should improve our documentation on the sources of our algorithm implementations, including:
- what the source is for the upstream implementation (and, if necessary, what upstreams are above that)…
-
After working out some proof of concept code to try out https://github.com/mit-plv/fiat-crypto for elliptic curve stuff, it turns out to be fairly straightforward to build and include native variants …
-
I was wondering what happens when there is a branch in the function, to use a simpler algorithm when (say) some variable is zero.
Below is a toy example, which seems to lead to wrong answers. What…
-
In the future we would want to experiment with different algorithms and compare these with each other. This will require a few steps:
- Work out way to configure and run different algorithm implement…
-
In a library context, there is a possibility that multiple implementations of an algorithm can exist. For example, a _libctx_ can load one provider which uses the underlying hardware accelerator, the …
-
### Detailed description
Demonstrating Pascal's triangle using C++
### Context
operations on a data structure can be performed to implement Pascal's triangle.
please allow me with this iss…
-
Hi,
in the pkcs7 implementation, function NewSignedData in sign.go defaults to using SHA-1 as digest algorithm.
https://github.com/smallstep/pkcs7/blob/5e2c6a136dfaa418340bb4a7eb0d0c7421d4934c/sig…
-
Everybody knows about the MD5 SHA-1 SHA-256 SHA-512 algorithms, and these are almost universally written as md5 sha1 sha256 sha512. Unfortunately, the PURL spec says the key for the checksum qualifier…
-
### Proposal Details
_Note: not a formal proposal since this is internal work without new exposed APIs or observable behaviour. It's primarily surfacing FIPS work for tracking purposes._
## Backgr…
-
Research the internet about different implementations of the Viterbi algorithm.
- [ ] Research what the Viterbi Algorithm is.
- [ ] Choose a variation of the algorithm to implement.
- [ ] Researc…