dave-andersen / cudaptsLinks
An Nvidia-based miner for the Protoshares (PTS) cryptocurrency
☆38Updated 11 years ago
Alternatives and similar repositories for cudapts
Users that are interested in cudapts are comparing it to the libraries listed below
Sorting:
- Solve discrete logarithm problems by the number field sieve method.☆18Updated 7 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- ☆24Updated 3 years ago
- Experiments in high-assurance crypto.☆47Updated 2 years ago
- ☆24Updated 8 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Updated 9 years ago
- Ethereum Dagger mining simulator. Tests impact of growing DAG size on Hashrate.☆14Updated 9 years ago
- CPU solver for Zcash's variant of Equihash problem☆22Updated 8 years ago
- multi-parameter Equihash proof-of-work multi-threaded C solvers☆151Updated 4 years ago
- A fast secure userspace pseudorandom number generator☆82Updated 11 years ago
- Zerocoin: C++ lib for anonymous extension to bitcoin☆177Updated 5 years ago
- Submission site for Zcash Foundation grant proposals☆25Updated 7 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- ☆85Updated 8 years ago
- Lightweight cryptographic hash functions (reference code)☆16Updated 11 years ago
- A low-level bitcoin library written in standard C.☆118Updated 9 years ago
- Equihash solver port from C++ to C for Zcash☆33Updated 7 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Feed-forward Bloom filters☆52Updated 14 years ago
- SHA-3 finalist (reference code)☆39Updated 11 years ago
- Work-in-progress Dissent port/rewrite for low-latency anonymous communication☆11Updated 6 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- A detailed michroarchitectural x86 simulator☆62Updated 8 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 7 years ago
- Simulates Attacks of AB16 on Argon2i☆11Updated 8 years ago
- Old NVIDIA CUDA implementation of salted MD5 brute-force☆17Updated 9 years ago
- ☆80Updated 8 years ago
- Deterministic execution virtual machine sandbox for Moxie arch☆74Updated 5 years ago
- C version of the MetroHash function☆27Updated 10 years ago