lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 15 Sep 2014 14:23:03 -0400
From: Bill Cox <waywardgeek@...hershed.org>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] BSTY - yescrypt-based cryptocoin

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 09/15/2014 01:31 PM, Solar Designer wrote:
> On Mon, Sep 15, 2014 at 09:21:03PM +0400, Solar Designer wrote:
>> Meanwhile, there's standalone minerd:
>> 
>> https://github.com/noncepool/cpuminer-yescrypt 
>> http://forum.globalboost.org/index.php?topic=197.0
>> 
>> which works fine for me (and the rebuilt new wallet happens to
>> work, too).  It does 11.03 kh/s on 2x E5-2670, and 3.47 kh/s on
>> i7-4770K. (I built it with "-O2 -fomit-frame-pointer
>> -march=native" on each.)
>> 
>> There are also several pools (3 of them so far?)  This one works
>> for me, along with minerd above:
>> 
>> http://bsty.altpooler.com
> 
> BTW, this pool currently reports:
> 
> "Network Hashrate: 1,942.19 KH/s | Pool Hashrate: 955.08 KH/s |
> Workers: 179"
> 
> 955.08/179 = ~5.33 kh/s per worker (maybe many machines are
> dual-CPU or bigger?)
> 
> 1942.19/3.47 = ~560 equivalents of i7-4770K are currently mining
> BSTY
> 
> Maybe we'll see attempts at more optimized yescrypt code soon -
> e.g., AVX2 code is easy to write, likely for some speedup.  I've
> been postponing this as it was not essential for PHC at this time
> (with other aspects having higher priority), but perhaps folks who
> are serious about mining this coin will feel differently.
> 
> Alexander
> 

Wow!  That network hash rate is crazy!  I guess the pool thing really
helped, but with those numbers, maybe there's an admin at some monster
data center somewhere having some fun...

The h/s has been all over the map.  It was > 600K/s two days ago, then
down to 300K/s yesterday, and now close to 2,000K/s today.

Bill
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=xLP/
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ