LE is a programming language built on top of C language. It has strong support for Machine Learning, Statistics in Computer Science and also strong support for Media Streaming, Image Processing, Estimation, Embedded, Cryptography, Data Science, Data Structures, Sorting, Object Oriented Programming (OOP), Design Patterns.
LE is created by Phu Le, LBR 03 May 2018, Vietnam. It has Cross Virtual Machine Model (CVMM) and LENI (LE Native Interface) models which built in to flexibly adapt to another programming language or program such as C/C++. It also has a safe environment, automatic memory management, and good facilities for handling strings and other kinds of data with dynamic size.
Here is basically demo of LE language: Youtube
- API references: Link
- LE Basics:
- Object Oriented Programming (OOP)
- Web Programming
- Estimation: [COCOMO II]
- Machine Learning
- Stream ciphers:
[ChaCha-8], [ChaCha-12], [ChaCha-20], [Panama], [Sosemanuk], [Salsa20], [XSalsa20], [ARC4], [SEAL 3.0], [WAKE]
- Block ciphers:
[AES-128], [AES-192], [AES-256], [Rijindeal], [RC2], [RC5], [RC6], [MARS], [Twofish], [Serpent], [CAST-128], [CAST-256], [DESX], [DES], [Triple DES], [ARIA], [IDEA], [Blowfish], [Camellia], [SEED], [Kalyna-128], [Kalyna-256], [Kalyna-512], [SIMON-64], [SIMON-128], [SPECK-64], [SPECK-128], [Skipjack], [SHACAL-2], [sm4], [Threefish-256], [Threefish-521], [Threefish-1024], [TEA], [XTEA], [SAFER], [3-WAY], [GOST], [SHARK], [Square]
- Padding: ZERO (zero), PKCS #5 (pkcs#5), ONE AND ZERO (oneandzero), W3C (w3c)
- Modes of operation: ECB (ecb), CBC (cbc), CBC Ciphertext Stealing - CTS (cts), CFB (cfb), OFB (ofb), Counter Mode - CTR (ctr)
[RSA], [DSA], [Determinsitic DSA], [ElGamal], [Nyberg-Rueppel (NR)], [Rabin-Williams (RW)], [LUC], [LUCELG], [EC-based German Digital Signature (ECGDSA)], [DLIES (variants of DHAES)], [ESIGN]
- Elliptic curve:
[ECDSA], [Determinsitic ECDSA], [ECNR], [ECIES], [ECDH], [ECMQV]
- Hash functions:
[SHA-1], [SHA-2 (224)], [SHA-2 (256)], [SHA-2 (384)], [SHA-2 (512)], [SHA-3 (224)], [SHA-3 (256)], [SHA-3 (384)], [SHA-3 (512)], [BLAKE2s], [BLAKE2b], [Keccack (F1600)], [SipHash], [Sosemanuk], [SM3], [Tiger], [RIPEMD-128], [RIPEMD-160], [RIPEMD-256], [RIPEMD-320], [WHIRLPOOL], [MD2], [MD4], [MD5], [Panama Hash]
- Message Authentication:
[BLAKE2s], [BLAKE2b], [CMAC], [CBC-MAC], [DMAC], [GMAC], [HMAC], [Poly1305], [SipHash], [Two-Track-MAC], [VMAC]
- Key Exchanging:
[Diffie-Hellman (DH)], [Unified Diffie-Hellman (DH2)], [Menezes-Qu-Vanstone (MQV)], [Hashed MQV (HMQV)], [Fully Hashed MQV (FHMQV)], [LUCDIF], [XTR-DH]
- Stream ciphers:
- Image Processing
- Media Streaming
- Data Science
- Data Structures
- Design Patterns
- Log level: DEBUG, INFOR, WARNING, ERROR, FATAL
- Format: Zip (zip), 7z (7z), Brotli (brotli), Tar (tar), Gzip (gzip), LZFSE (lzfse), Bzip2 (bzip2), Huff0 (huff0), FSE (fse), LZ4 (lz4), LZMA (lzma), LZHAM (lzham).
LE version 1.0 Release notes:
- LE18 v1.0 with fully fundamental.
- For downloading, it only has an internal license by Phu Le.
Syntax and Example CodeTo see more details of LE syntax, you can read this book: LE programming language.pdf
print(“Hello world”); print(“Hello world\r\n”); println(“Hello world”);
//Comment line /* Block comment */
var p,t; p,t = 305,126;