Horkyze / CudaSHA256Links
Simple tool to calculate sha256 on GPU using Cuda
☆94Updated 10 months ago
Alternatives and similar repositories for CudaSHA256
Users that are interested in CudaSHA256 are comparing it to the libraries listed below
Sorting:
- A Collection of Hashing Algorithms Implemented In CUDA☆92Updated 5 years ago
- elliptic curve cryptography with GPU acceleration☆23Updated 2 years ago
- very fast (NOT SECURE) implementation of arithmetic on curve secp256k1 on x86_64☆24Updated 4 years ago
- Tool for computing elliptic curve (EC) discrete logarithms☆36Updated 7 years ago
- ☆102Updated last year
- MD5,SHA1,SHA256,SHA512,HMAC,PBKDF2,SCrypt Bruteforcing tools using OpenCL (GPU, yay!) and Python☆186Updated 4 months ago
- pollard's p-1 algorithm on CUDA☆27Updated 11 years ago
- Cuda Secp256k1 Brain Wallet Recovery Tool☆60Updated 9 months ago
- Source code of "GPU-accelerated elliptic curve digital signature algorithms", accepted by SC'22 - by Zonghao Feng, Qipeng Xie, Qiong Luo,…☆23Updated 2 years ago
- A fast and unsafe version of an optimized C library for EC operations on curve secp256k1☆25Updated last year
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆40Updated 9 months ago
- ☆31Updated last year
- ☆47Updated 10 years ago
- Tools for computing Elliptic Curve interval discrete logarithms using Pollard's lambda algorithm☆24Updated 4 years ago
- Lattice ECDSA attack☆131Updated 3 years ago
- Accelerating bitcoin's ECDSA - implemented in C and OpenCL for GPUs☆55Updated 5 years ago
- A 128 bit unsigned integer class for CUDA☆46Updated 5 months ago
- Pollard's kangaroo for SECPK1☆303Updated last year
- CGBN: CUDA Accelerated Multiple Precision Arithmetic (Big Num) using Cooperative Groups☆214Updated 3 months ago
- visualize operations on the secp256k1 elliptic curve including point addition, multiplication, signing and verifying☆30Updated 9 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks☆57Updated 5 years ago
- RandomX CUDA implementation☆36Updated 2 years ago
- Breaking ECDSA (not so broken) with LLL☆81Updated 2 months ago
- Baby Step Giant Step for SECPK1☆66Updated 5 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks, C99☆22Updated 5 years ago
- Bitcoin Private Key Extractor☆17Updated 6 years ago
- SAT-based, MILP, and belief propagation preimage attacks on SHA-256 and other cryptographic hash functions☆38Updated 2 years ago
- Brute force BIP-39 Mnemonic using CPU☆129Updated 4 years ago
- Open Source Bitcoin Vanity Address Generation on FPGAs☆29Updated 3 years ago
- POSTECH: Heterogeneous Parallel Computing (Fall 2023)☆10Updated last year