Introduction
Introduction Statistics Contact Development Disclaimer Help
Post AurPYwtSaOFjR4uQym by [email protected]
More posts by [email protected]
Post #AurPCs1G1m3Pwp1pZI by [email protected]
0 likes, 2 repeats
So anyway, some people do crossword puzzles, I do assembly golf to cryptographi…
Post #AurPYwn4y79H7HvL28 by [email protected]
0 likes, 0 repeats
@ryanc waow,, impressive, very interesting
Post #AurPYwtSaOFjR4uQym by [email protected]
0 likes, 1 repeats
@alina I'm going to eventually implement the whole SHA256 algorithm. 😄
Post #AurVwnoQbIFTwiJT3g by [email protected]
0 likes, 0 repeats
@ryanc Wonder how small that could get without all the calling convention overh…
Post #AurWkyKtkQ8541QJRg by [email protected]
0 likes, 0 repeats
@ryanc I implemented the MD5 algorithm on the NES. It takes 1637 bytes of progr…
Post #AurZx8clccY6JGH41Q by [email protected]
0 likes, 1 repeats
@jripley saving/restoring rbp and rbx actually saved bytes due to shorter opcod…
Post #AurapDBOtBx65MG3NY by [email protected]
0 likes, 1 repeats
@0x10f Neat!
You are viewing proxied material from pleroma.anduin.net. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.