VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Driver/Driver.vcxproj
AgeCommit message (Collapse)AuthorFilesLines
2019-03-01Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 ↵Mounir IDRASSI1-0/+3
cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha)
2019-02-12Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by ↵Mounir IDRASSI1-0/+1
Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de)
2019-02-08Windows: Add implementation of ChaCha20 based random generator. Use it for ↵Mounir IDRASSI1-0/+4
driver need of random bytes (currently only wipe bytes but more to come later).
2019-02-01Windows driver: better randomness for wipe bytes by always using Whirlpool ↵Mounir IDRASSI1-0/+3
hash of current time and random bytes retrieved using CPU RDRAND/RDSEED if available.
2017-06-23Crypto: Add optimized SHA-512 and SHA-256 assembly implementations for ↵Mounir IDRASSI1-0/+27
x86_64 and x86. This improves speed by 30%.
2017-06-21Crypto: Add optimized Camellia assembly implementation for x86_64 based on ↵Mounir IDRASSI1-0/+3
work by Jussi Kivilinna (https://github.com/jkivilin/supercop-blockciphers). This improve speed by a factor of 2.5 when AES-NI supported by CPU and by 30% if AES-NI not supported.
2016-10-17Crypto: Use SIMD optimized Serpent implementation from Botan. 2.5x speed ↵Mounir IDRASSI1-1/+2
gain factor. Update credits and copyrights notice.
2016-06-17Windows: Use Visual C++ 2010 instead of Visual C++ 2008.Mounir IDRASSI1-0/+264