Many branches may be removed by computing min(a,b) and "?title=Hacker's Delight">mixtures of Boolean algebra and arithmetic.
algorithm | RSA (algorithm) | Secure Hash Algorithm | binary | Schönhage–Strassen algorithm | Luhn algorithm | Earley's Algorithm | Dijkstra's algorithm | CYK algorithm | Viterbi algorithm | Prim's algorithm | Levenberg–Marquardt algorithm | Kosaraju's algorithm | Yarrow algorithm | universal binary | sorting algorithm | Root-finding algorithm | Kruskal's algorithm | Generic Security Service Algorithm for Secret Key Transaction | Digital Signature Algorithm | Cayley–Purser algorithm | Blahut–Arimoto algorithm | Binary tree | Binary Runtime Environment for Wireless | Binary-coded decimal | Bellman–Ford algorithm | Algorithm | XML-binary Optimized Packaging | Verhoeff algorithm | Vatti clipping algorithm |