Repos
30
Stars
16
Forks
2
Top Language
C++
Loading contributions...
Top Repositories
This game plays perfect Tic-Tac-Toe as the second player using the brute-force minimax.
Multiprecision carry select adder.
This repository contains code for a UCI engine which acts on the advice of other UCI engines.
Authennticated OTP in C++
An implementation of the Blum-Micali algorithm as a C++ <random>-style rng
Code for probing the measurement problem on the IBM quantum hardware
Repositories
30This game plays perfect Tic-Tac-Toe as the second player using the brute-force minimax.
Multiprecision carry select adder.
An implementation of the Blum-Micali algorithm as a C++ <random>-style rng
Code for probing the measurement problem on the IBM quantum hardware
The original sources of MS-DOS 1.25 and 2.0, for reference purposes
Port of chunked QNN code for IBM quantum hardware
No description provided.
Morse code generator in C++ without external dependencies
Basic Linux file-copy utility using sendfile
The rewritten engine, originally for tensorflow. Now all other backends have been ported here.
This repository contains code for a UCI engine which acts on the advice of other UCI engines.
No description provided.
A chess adaption of GCP's Leela Zero
A faster random_device. 6x faster than libstdc++ on my system
No description provided.
This is a script for chatting on Facebook over the command line.
No description provided.
Authennticated OTP in C++
This repository contains programs for the cybersecurity camp
This repository contains a program which memfrob()s each byte on stdin and prints to stdout.
Google Cloud Storage Streamer
This repository hosts the Lab Monitor XBee Network Daemon
The C++ Core Guidelines are a set of tried-and-true guidelines, rules, and best practices about coding in C++
:video_game: A list of popular/awesome videos games, add-ons, maps, etc. hosted on GitHub. Any genre. Any platform. Any engine.
Java program for computing message digests using the java.security API.
This repository contains a graphical program for calculating a zombie math model.
The program allows for analysis of certain csv files. It is unlikely to be useful in general without modification.
This repository contains an implementation of a (hopefully) information-theoretically secure encryption and authentication program.
This program computes the exact value of a given number of terms of the Gregory Series as a rational.
This program finds word anagrams with the ENABLE word list.