jheusser / satcoinLinks
SAT-based Bitcoin Mining
☆87Updated 3 years ago
Alternatives and similar repositories for satcoin
Users that are interested in satcoin are comparing it to the libraries listed below
Sorting:
- CGen is a tool for encoding SHA-1 and SHA-256 hash functions into CNF in DIMACS format, also into ANF polynominal system in PolyBoRi outp…☆25Updated 2 years ago
- SAT instance generator for SHA-1☆49Updated 4 years ago
- Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation.☆30Updated 11 months ago
- A low-level bitcoin library written in standard C.☆118Updated 9 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- SAT-based, MILP, and belief propagation preimage attacks on SHA-256 and other cryptographic hash functions☆39Updated 2 years ago
- Simple recursive and iterative SAT solver written in Python.☆123Updated 6 years ago
- C++11 library for many-sorted logics☆39Updated 8 years ago
- Haraka is a secure and efficient short-input hash function.☆57Updated 7 years ago
- Equihash solver port from C++ to C for Zcash☆33Updated 7 years ago
- Very small, readable implementation of the SHA3 hash function.☆217Updated 8 years ago
- Lower Size Bounds for Sorting Networks☆46Updated 4 years ago
- Revectorization passes integrated into the LLVM compiler infrastructure☆31Updated 6 years ago
- Python implementation of Schoof's algorithm for counting the points on elliptic curves over finite fields☆43Updated 6 years ago
- ACOVEA (Analysis of Compiler Options via Evolutionary Algorithm) implements a genetic algorithm to find the "best" options for compiling …☆75Updated 7 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 6 years ago
- s-expression → internal IR → LLVM IR☆46Updated 9 years ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆99Updated 8 years ago
- General number field sieve for python☆18Updated 9 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 7 years ago
- A tweaked version of Aha! ("A Hacker's Assistant") the superoptimiser by Henry S. Warren☆58Updated 3 years ago
- ☆14Updated 8 years ago
- The proof-of-work algorithm for Zcash☆83Updated 7 years ago
- Optimized implementations of Poly1305, a fast message-authentication-code☆45Updated 10 years ago
- Nayuki's implementation of cryptographic primitives used in Bitcoin.☆144Updated 3 years ago
- SHA256-SAT-BITCOIN☆24Updated 9 years ago
- Equihash: memory-hard PoW with fast verification☆133Updated 8 years ago
- Program for finding low gate count implementations of S-boxes.☆40Updated 8 months ago
- Xoocycle, a C90 implementation of the Xoodyak hash and AEAD construction☆10Updated 6 years ago
- llvm opt fuzzer and bounded exhaustive test generator☆40Updated 2 years ago