Re: Another SHA2 implementation
From: Tom St Denis (tomstdenis_at_gmail.com)
Date: 30 Apr 2005 10:16:13 -0700
Juuso Hukkanen wrote:
> On Sat, 30 Apr 2005 16:23:12 +0200, Olivier Gay
> <firstname.lastname@example.org> wrote:
> >I wrote an optimized C software implementation of hash algorithms
> >SHA-256, SHA-384 and SHA-512.
> >The code is distributed under the BSD license:
> Hi Oliver,
> Are you sure about the address?
> whois or traceroute don't recognize the domain (at least not yet)
> btw. How amazing, last night I was looking after alternative (to
> libtomcrypt) public domain/ BSD sources for SHA-512. Oliver could you
> consider licensing Toms license into your SHA sources? Many of the
> most widespread sources for a individual algorithms seem to be public
> domain. My observation is that as time goes by, the most popular
> sources for any individual algotithm will be those with the most
> liberal license. Also most/many/some/one public domain code
> utilizer(s) have no difficulty in remembering to credit the original
> authors vounteerly.
No offsense to the OP but I don't see the point in using his code over
mine [*]. We're both in C and achieve the same throughput. My license
is public domain which is as open as humanly possible.
[*] Note that I do see the value in implementing the algorithm. It's