dada.perl.it
The Great Win32 Computer Language Shootout
http://dada.perl.it/shootout
The Great Win32 Computer Language Shootout. Back to the Win32 Shootout. Back to dada's perl lab. 51 Language Implementations, 25 Benchmark Tests, 1275 Total Possible Programs, 983 Completed ]. Of which solutions have/have not been implemented. Hash (Associative Array) Access. Hashes, Part II. Sum a Column of Integers. Not all languages are tested in every benchmark). A benchmark comparison of a number of programming languages. Note: I'M NOT THE AUTHOR OF THE SHOOTOUT! And, above all:. I should also add a...
prolog.info
Prolog.info: Programming Environments
http://www.prolog.info/environments.html
aarongifford.com
Open Source (BSD Licensed) Secure Hash Algorithm (SHA) Implementations in C by Aaron Gifford, including SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512
http://www.aarongifford.com/computers/sha.html
If the page contents do not appear, it may mean that JavaScript is disabled in your browser. Please enable JavaScript to view this. This content must not be viewed within an enclosing frame. Aaron Gifford's Implementations of SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. Secure Hash Algorithm (SHA). Photo: Caanan Mountain Above the High Desert Plain. You are not logged in. Click here. SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. NEW 07 JANUARY 2004. Hmac sha1.tar.gz. Thank you, David Ireland. Thank yo...