frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Building Organizational Capacity for Large-Scale Change

https://www.psychologytoday.com/us/blog/the-emergency-mind/202507/building-organizational-capacity-for-large-scale-change
1•exiguus•2m ago•0 comments

Satellite evidence points to heightened operations at N. Korean nuclear site

https://www.dailynk.com/english/satellite-evidence-points-heightened-operations-north-korean-nuclear-site/
1•giuliomagnifico•3m ago•0 comments

Performance Profiling on AMD GPUs – Part 1: Foundations

https://rocm.blogs.amd.com/software-tools-optimization/profiling-guide/intro/README.html
1•ibobev•7m ago•0 comments

UFOs, Aliens, and the Unknown Other

https://www.psychologytoday.com/us/blog/evil-deeds/202501/ufos-aliens-and-the-unknown-other
1•exiguus•10m ago•0 comments

US Job Growth Picks Up

https://www.bloomberg.com/news/articles/2025-07-03/us-payroll-growth-beats-forecasts-jobless-rate-drops-to-4-1
2•Redoubts•11m ago•0 comments

Real-Time Importance Deep Shadows Maps with Hardware Ray Tracing

https://diglib.eg.org/items/ff5055b6-be32-414a-8d63-41fdb7296e10
1•ibobev•12m ago•0 comments

LoRA Fine-Tuning Without GPUs

https://arxiv.org/abs/2507.01806
1•elashri•13m ago•0 comments

UPS Offers Buyouts to Drivers, a First in Its 117-Year History

https://www.wsj.com/business/logistics/ups-driver-buyout-first-117-years-f3be772c
2•bookofjoe•15m ago•1 comments

Caddy module to help match against DNS blocklists

https://git.madhouse-project.org/caddy/http.matchers.dnsbl
2•gslin•15m ago•0 comments

Show HN: Claude Code History Viewer for macOS

https://github.com/jhlee0409/claude-code-history-viewer/releases
1•jackleee•15m ago•0 comments

Real-Time GPU Tree Generation

https://diglib.eg.org/items/93fc78c0-71fa-4511-8564-a7e5268bf27a
1•ibobev•16m ago•0 comments

AI Pods as a Service: Modular, Scalable, and Built for Speed

https://www.bain.com/insights/ai-pods-as-a-service-modular-scalable-and-built-for-speed/
1•wslh•16m ago•0 comments

Drug Discovery May Be in the Cold War Era

https://kyunghyuncho.me/drug-discovery-may-be-in-the-cold-war-era/
1•sebg•20m ago•0 comments

Urban environment influences adolescent's sense of justice and trust

https://phys.org/news/2025-06-adolescents-urban-environment-justice.html
3•PaulHoule•24m ago•0 comments

Restate 1.4: We've Got Your Resiliency Covered

https://restate.dev/blog/announcing-restate-1.4/
1•stsffap•25m ago•1 comments

Heisenbug

https://en.wikipedia.org/wiki/Heisenbug
2•matthewsinclair•26m ago•0 comments

Is mental health 'awareness' backfiring?

https://theneuroscienceofeverydaylife.substack.com/p/is-mental-health-awareness-backfiring
2•lentoutcry•27m ago•0 comments

MedOne's Colocation Network

https://www.technology.org/2025/07/03/the-infrastructure-israel-depends-on-inside-medones-colocation-network/
1•MedOneLtd•27m ago•0 comments

Fixing the Amiga 1200 with a cheap meter [video]

https://www.youtube.com/watch?v=e6jCbyfwWOY
2•GeoAtreides•27m ago•0 comments

Passive Smartphone Sensors for Detecting Psychopathology

https://jamanetwork.com/journals/jamanetworkopen/fullarticle/2836015
1•geox•28m ago•0 comments

Keep 5-year ILR terms for Hong Kong British National (Overseas) visas

https://petition.parliament.uk/petitions/727356
2•alphawong•29m ago•1 comments

Bosses are catching on to their 'overemployed' staff

https://fortune.com/2025/07/03/overemployed-workers-five-jobs-six-figure-salaries-infiltrate-tech-startups-reddit-community/
3•donsupreme•29m ago•1 comments

Free AI tool for GTM and sales

https://www.getsteerco.com/
1•growthwhisperer•30m ago•0 comments

Towards Compositional Reactivity

https://stackdiver.com/posts/streamlet-towards-compositional-reactivity/
1•low_tech_punk•30m ago•0 comments

Show HN: SanctionSnap – free 250 sanctions checks via API

https://sanctionsnap.com
1•sbjartmar•31m ago•0 comments

Our Small Team vs. Bots

https://www.fsf.org/blogs/sysadmin/our-small-team-vs-millions-of-bots
2•aendruk•31m ago•0 comments

Security Advisory: Airoha-Based Bluetooth Headphones and Earbuds

https://insinuator.net/2025/06/airoha-bluetooth-security-vulnerabilities/
2•perlgeek•32m ago•0 comments

Code Reviews, Not Code Approvals

https://rethinkingsoftware.substack.com/p/code-reviews-not-code-approvals
2•aard•34m ago•0 comments

Gate Array

https://en.wikipedia.org/wiki/Gate_array
2•sandwichsphinx•36m ago•1 comments

AI's Existential Crisis: An Unexpected Journey with Cursor and Gemini 2.5 Pro

https://medium.com/@sobyx/the-ais-existential-crisis-an-unexpected-journey-with-cursor-and-gemini-2-5-pro-7dd811ba7e5e
2•craneca0•39m ago•0 comments
Open in hackernews

Parallelizing SHA256 Calculation on FPGA

https://www.controlpaths.com/2025/06/29/parallelizing_sha256-calculation-fpga/
45•hasheddan•6h ago

Comments

15155•5h ago
Now try a fully unrolled/pipelined design that emits one hash per clock cycle for actual parallelization.
m3kw9•5h ago
Or try hardcoding a few billion trillions of premade hashes
nayuki•5h ago
https://en.wikipedia.org/wiki/Rainbow_table ?
picture•4h ago
I know why you're downvoted, but it's true, the author is not using FPGAs correctly.
Retr0id•5h ago
So what's the overall hashrate with this approach?

I'll try to calculate it from the information given. 12 parallel instances at a clock speed of 62.5MHz, with 68 clock cycles per hash.

62.5MHz * 12 / 68 = ~11MH/s

That seems... slow? Did I do the math right? How big of an FPGA do you need before this would compete with a GPU, and how much would it cost?

For reference, an RTX 4090 can do 21975.5 MH/s according to hashcat benchmarks.

picture•4h ago
Quite slow. It's largely due to the author using FPGAs wrong. Clocking down a 7-series Artix to 62.5 MHz means the design is not pipelined correctly/enough. My friend got 1 SHA256 hash per cycle at 300 MHz on 7 series, but slightly fewer of the design fit on a chip. Thruput would easily be in the GH/s range.

Keep in mind RTX4090 is 5 nm process node and has a lot more transistors and memory than XC7A100T, which is 28 nm. That's a huge difference in terms of dynamic performance. Also, the two are also released 10 years apart. If you compare RTX4090 against a similarly modern UltraScale part from Xilinx, I believe the FPGA can be notably faster than RTX4090.

benlivengood•4h ago
I'm assuming this space has already been heavily optimized by the Bitcoin miners on their way to ASICs.
picture•4h ago
Yes, hard silicon will be another magnitude more performant than FPGAs and GPUs, but ASICs properly take on negative value when they're no longer profitable to mine with. (Note that efficiency won't be much better at the same process node. You can just pump more power through each ASIC die)

Edit - I misread your comment. ASIC designers will use FPGAs to test their design but it won't be optimized for FPGAs which have a different logic-and-memory characteristic than ASICs. There aren't many great SHA256 FPGA implementations, largely because there's not that much demand for one

the8472•3h ago
> but ASICs properly take on negative value when they're no longer profitable to mine with

No matmul coin where the hardware could be repurposed for AI stuff?

15155•3h ago
Modern BTC ASICs consist of 1600-3200 SHA256 cores and only output nonces for sha256(sha256(btcBlockHeader)) - there's no memory or ability to obtain other output.
throwawaymaths•1h ago
always thought it might be cool to repurpose fast double sha engines for error detection in storage arrays
throwawaymaths•1h ago
matmul isn't a trapdoor function
Retr0id•4h ago
Unfortunately I think most of that innovation happened behind closed doors, because everyone wanted to maintain their competitive advantages.
sMarsIntruder•2h ago
Yes, ASICS are definitely very closed source for that specific reason.
15155•3h ago
Yes, but a designed-for-FPGA SHA256 implementation looks very different than an ASIC SHA256 implementation - the ASIC has far greater routing flexibility and density, and can therefore use far more combinatorial logic between register stages.

(ASIC simulation on an FPGA will retain the combinatorial stages but run at dramatically lower fMax)

15155•3h ago
SHA256 is extremely FF-heavy, you need around 200k for an optimized, unrolled, pipelined implementation.

UltraScale+ chips will run a proper design at 600MHz-800MHz, big chips might be able to fit 24 cores. The Artix chip OP used is extremely slow and too small to fit this style of implementation.

d00mB0t•4h ago
More posts like this please! How about a crypto accelerator on FPGA that's integrated with OpenSSL?
15155•3h ago
Unless you're talking about niche algorithms (and even then), the FPGA will get smoked by a CPU for most common tasks one would use OpenSSL for.
d00mB0t•2h ago
Yes--obviously modern CPUs have crypto extensions that would be faster than an FPGA,this would be for educational purposes.
15155•2h ago
Even without the extensions, by the time you've moved the workload to the FPGA and back, the CPU has already completed whatever operation your FPGA was going to complete with OpenSSL.

FPGA cryptographic acceleration is about batch task bandwidth, OpenSSL has few places where this is required.

toast0•1h ago
If you want to do crypto acceleration for TLS, there's two places to do it. Handshake/signature/key agreement, which could maybe work, but hasn't been the bottleneck in a long time, eliptic curve dramatically reduces the work for the server and most clients can do it; but maybe shipping the data around for that is fine.

The other part is bulk encryption. CPUs have lots of acceleration for that, but clear text is still faster, so the win is not to ship data to an accelerator and then back to the cpu and then out to the NIC, but to ship to the accelerator and from there to the NIC without touching the CPU or often the accelerator is integrated with the NIC.

It works even better if the data never has to touch the CPU.

d00mB0t•1h ago
You must be great to talk to at parties lol, I guess I shouldn't build a RISC-V CPU because Intel is faster?
qdotme•4h ago
Great job!

For alternative design/writeup, check out http://nsa.unaligned.org

projektfu•43m ago
That seems to be the inverse function for SHA-1 and MD5.