ch/gb collab, NIST SHA-3 competition finalist. Strongly secure, high-performance algo
Solid, template-milled clones of the latest Bitcoin Core release in the PoW algo of your choice. Clean, precise and complete - your choice of name, symbol, economic parameters and graphics. Add extra features simply by selecting from a range of add-ons.
ch/gb collab, NIST SHA-3 competition finalist. Strongly secure, high-performance algo
Improved version of SHA-3 finalist BLAKE, optimized for 64-bit platforms.
IBM's NIST SHA-3 semi-finalist,strong against differential cryptanalysis
NIST SHA-3 finalist, strong against side-channel attacks and good performance
4 interleaved/concatenated rounds of hashing (BLAKE, Grøstl, Keccak, SHA-256). Anti-ASIC, pro-GPU, small memory footprint
NIST SHA-3 competition winnah. Notably faster in h/w than other finalists, equally secure, designed for h/w impl.
9 chained rounds of NIST SHA-3 candidates: BLAKE, BMW, Grøstl, JH, Skein and Keccak. 1 round for each algo + 3 @random
5 chained rounds of NIST SHA-3 semis : Luffa, CubeHash, SHAvite, SIMD and ECHO. CPU-friendly, GPU-accessible
ASIC-hostile, GPU-friendly algo using password-based key derivation function as PoW
UnitedScryptCoin merge-mined version of ASIC-hostile, GPU-friendly algo using PBKDF as PoW
CPU-friendly and fast. Integrity challenged, attack is theoretical so best used only for research/study.
Full native 32bit support, pro-ASIC, classic NIST fast midrange-digest hash function
2x faster than SHA-512, 3x faster than SHA-256. Conservative, uses Threefish block cipher, hashes short messages in ~1000 clock cycles.
1024 internal state size - exceptionally high level of security assurance. Fast w. long messages, nearly 2x faster than Skein-512 in hardware.
11 chained rounds of a predetermined sequence of hash algos: BLAKE, BMW, Grøstl, JH, Keccak, Skein, Luffa, CubeHash, SHAvite, SIMD, ECHO
Cooler, energy-efficient. 4 chained rounds of NIST SHA-3 256-bit hashing functions: Fugue, SHAvite, Hamsi, Panama. Anti-ASIC, pro-CPU, pro-GPU.
Anti-ASIC memory-hard PoW, checked in just a few ms but requiring Gb of RAM to solve efficiently
ISO standard, NESSIE-approved 512-bit hashing algo, joint br/be team, used for TrueCrypt.
Pure primes-search PoW algo for minting & security. May lead to useful number theory by-products
DirectConnect/Gnutella choice, pro-CPU, fast in software, but difficult to implement in h/w
MIT‘s withdrawn NIST SHA3 entry, now finally proved secure against differential cryptanalysis
jp team NIST SHA3 round one entry, unbroken. Inner functions anticipate and leverage SSE/AES
be team round 1 entry for NIST SHA3, unbroken. AES-style inner functions, tuned for energy efficiency
us/il NIST SHA3 1st round entry, unbroken. HAIFA FFT framework, asymptotic proof of security
+44-(0)1934-732723
VAT Reg: GB701276958
Contains semantic web technology, may also contain nuts.
NB: in development, structure and/or content may change without warning; uses RDFLib5.0.0-dev, Pyramid1.5dev & Python3.5.0+ sign in