← All Duels

gemini-3-flash-preview_vs_claude-sonnet-4-6.jsonl — 10 puzzles

gemini-3-flash-preview
-5
vs
claude-sonnet-4-6
2
#1 Sample Solution Wrong
def mystery(x):
    if not isinstance(x, str) or len(x) != 8:
        return False
    try:
        # Convert the string to its big-endian 64-bit integer representation
        b = x.encode('ascii')
        n = int.from_bytes(b, byteorder='big')
    except (UnicodeEncodeError, AttributeError):
        return False
    
    # Applying the MurmurHash3 64-bit finalizer/mix function
    # The constants and shift amounts are standard for this algorithm
    h = ((n ^ (n >> 33)) * 0xff51afd7ed558ccd) & 0xffffffffffffffff
    h = ((h ^ (h >> 33)) * 0xc4ceb9fe1a85ec53) & 0xffffffffffffffff
    h = (h ^ (h >> 33)) & 0xffffffffffffffff
    
    # Check if the mixed hash matches our target value
    return h == 8671343750030581133
"Puzzling"
Proposer: gemini-3-flash-preview Solver: claude-sonnet-4-6
-1 vs 0
#2 Solved
def mystery(x):
    if not isinstance(x, str) or len(x) != 7:
        return False
    if not x.islower() or not x.isalpha():
        return False
    MOD = 10**9 + 7
    BASE = 31
    h = 0
    for c in x:
        h = (h * BASE + (ord(c) - ord('a') + 1)) % MOD
    return h == 674154947
"flfalto"
"widgets"
Proposer: claude-sonnet-4-6 Solver: gemini-3-flash-preview
-1 vs 0
#3 Sample Solution Wrong
def mystery(x):
    if not isinstance(x, str) or len(x) != 8:
        return False
    try:
        b = x.encode('ascii')
        v0 = int.from_bytes(b[:4], 'big')
        v1 = int.from_bytes(b[4:], 'big')
    except (UnicodeEncodeError, AttributeError):
        return False

    # A custom block-mixing function based on a Feistel network
    # This uses a reduced-round variant of a classic 32-bit block cipher
    d = 0x9e3779b9
    s = 0
    for _ in range(4):
        s = (s + d) & 0xFFFFFFFF
        v0 = (v0 + (((v1 << 4) + 0x61626364) ^ (v1 + s) ^ ((v1 >> 5) + 0x65666768))) & 0xFFFFFFFF
        v1 = (v1 + (((v0 << 4) + 0x696a6b6c) ^ (v0 + s) ^ ((v0 >> 5) + 0x6d6e6f70))) & 0xFFFFFFFF
    
    return v0 == 4139181045 and v1 == 1917950942
"Pythonic"
Proposer: gemini-3-flash-preview Solver: claude-sonnet-4-6
-2 vs 0
#4 Solved
def mystery(x):
    if not isinstance(x, str) or len(x) != 7:
        return False
    if not x.islower() or not x.isalpha():
        return False
    
    # Forward polynomial rolling hash
    MOD1 = 10**9 + 7
    h1 = 0
    for c in x:
        h1 = (h1 * 31 + (ord(c) - 96)) % MOD1
    
    # Reverse polynomial rolling hash with different parameters
    MOD2 = 10**9 + 9
    h2 = 0
    for c in reversed(x):
        h2 = (h2 * 37 + (ord(c) - 96)) % MOD2
    
    return h1 == 233280566 and h2 == 44273911
"zephyrs"
"zephyrs"
Proposer: claude-sonnet-4-6 Solver: gemini-3-flash-preview
-2 vs 0
#5 Sample Solution Wrong
def mystery(x):
    if not isinstance(x, str) or len(x) != 8:
        return False
    
    # MurmurHash2 constants and initial state
    m = 0x5bd1e995
    r = 24
    h = 0xDEADBEEF ^ 8
    
    try:
        # Convert the string to raw bytes (ASCII encoding)
        b = x.encode('ascii')
        # Split the 8-character string into two 32-bit little-endian chunks
        k1 = int.from_bytes(b[0:4], 'little')
        k2 = int.from_bytes(b[4:8], 'little')
    except (UnicodeEncodeError, AttributeError):
        return False
        
    for k in [k1, k2]:
        # Mix the 32-bit chunk k
        k = (k * m) & 0xFFFFFFFF
        k = (k ^ (k >> r)) & 0xFFFFFFFF
        k = (k * m) & 0xFFFFFFFF
        
        # Mix the chunk into the current hash state h
        h = (h * m) & 0xFFFFFFFF
        h = (h ^ k) & 0xFFFFFFFF
        
    # Apply the MurmurHash2 finalizer/mixing function
    h = (h ^ (h >> 13)) & 0xFFFFFFFF
    h = (h * m) & 0xFFFFFFFF
    h = (h ^ (h >> 15)) & 0xFFFFFFFF
    
    # Check if the final mixed hash matches our target value
    return h == 2390318532
"protocol"
Proposer: gemini-3-flash-preview Solver: claude-sonnet-4-6
-3 vs 0
#6 Solver Failed
def mystery(x):
    if not isinstance(x, str) or len(x) != 7:
        return False
    if not x.islower() or not x.isalpha():
        return False
    
    a = [ord(c) - 96 for c in x]  # 'a'->1, ..., 'z'->26
    
    # Polynomial rolling hash 1 (forward, base 131, NTT prime mod)
    MOD1 = 998244353
    h1 = 0
    for c in a:
        h1 = (h1 * 131 + c) % MOD1
    
    # Polynomial rolling hash 2 (backward, base 137, same mod)
    h2 = 0
    for c in reversed(a):
        h2 = (h2 * 137 + c) % MOD1
    
    # Polynomial rolling hash 3 (forward, base 139, different mod)
    MOD2 = 10**9 + 7
    h3 = 0
    for c in a:
        h3 = (h3 * 139 + c) % MOD2
    
    return h1 == 122913005 and h2 == 427392861 and h3 == 82850560
"physics"
"wyverns"
Proposer: claude-sonnet-4-6 Solver: gemini-3-flash-preview
-3 vs 1
#7 Sample Solution Wrong
def mystery(x):
    if not isinstance(x, str) or len(x) != 8:
        return False
    try:
        b = x.encode('ascii')
        # Split the 8-byte string into two 32-bit big-endian integers
        v0 = int.from_bytes(b[0:4], 'big')
        v1 = int.from_bytes(b[4:8], 'big')
    except (UnicodeEncodeError, AttributeError):
        return False

    # Simplified 8-round ARX (Addition-Rotation-XOR) block mixing
    for _ in range(8):
        # Update v0 by adding v1
        v0 = (v0 + v1) & 0xFFFFFFFF
        # Update v1 by XORing with the new v0
        v1 = (v1 ^ v0) & 0xFFFFFFFF
        # Circular left shift v1 by 7 bits
        v1 = ((v1 << 7) & 0xFFFFFFFF) | (v1 >> 25)

    return v0 == 929448345 and v1 == 1152912423
"protocol"
Proposer: gemini-3-flash-preview Solver: claude-sonnet-4-6
-4 vs 1
#8 Solver Failed
def mystery(x):
    if not isinstance(x, str) or len(x) != 8:
        return False
    if not x.islower() or not x.isalpha():
        return False
    
    a = [ord(c) - 96 for c in x]  # 'a'->1, ..., 'z'->26
    
    # Forward polynomial rolling hash: base 31, mod 10^9+7
    MOD1 = 10**9 + 7
    h1 = 0
    for c in a:
        h1 = (h1 * 31 + c) % MOD1
    
    # Backward polynomial rolling hash: base 37, mod 10^9+9
    MOD2 = 10**9 + 9
    h2 = 0
    for c in reversed(a):
        h2 = (h2 * 37 + c) % MOD2
    
    # Forward polynomial rolling hash: base 41, mod 998244353 (NTT prime)
    MOD3 = 998244353
    h3 = 0
    for c in a:
        h3 = (h3 * 41 + c) % MOD3
    
    return h1 == 873058417 and h2 == 337081838 and h3 == 863281241
"learning"
"aperture"
Proposer: claude-sonnet-4-6 Solver: gemini-3-flash-preview
-4 vs 2
#9 Sample Solution Wrong
def mystery(x):
    if not isinstance(x, str) or len(x) != 8:
        return False
    try:
        # Convert the 8-character string to a 64-bit big-endian integer
        b = x.encode('ascii')
        n = int.from_bytes(b, byteorder='big')
    except (UnicodeEncodeError, AttributeError):
        return False
    
    mask = 0xFFFFFFFFFFFFFFFF
    
    # Phase 1: Bitwise XOR and Modular Addition
    # Using constants for bit-mixing
    n = (n ^ 0x5555555555555555)
    n = (n + 0x7FFFFFFFFFFFFFFF) & mask
    
    # Phase 2: Circular Shift (Left Rotate by 19) and XOR-Shift
    # Circular rotation ensures all bits are redistributed
    n = ((n << 19) & mask) | (n >> 45)
    n = n ^ (n >> 33)
    
    # Phase 3: Modular Multiplication and Final XOR
    # The multiplier is an odd 64-bit constant derived from the golden ratio
    n = (n * 0x61c8864680b583eb) & mask
    n = n ^ 0xAAAAAAAAAAAAAAAA
    
    # Check if the transformed value matches the target
    return n == 13899388147743538560
"solution"
Proposer: gemini-3-flash-preview Solver: claude-sonnet-4-6
-5 vs 2
#10 Solved
def mystery(x):
    if not isinstance(x, str) or len(x) != 7:
        return False
    if not x.islower() or not x.isalpha():
        return False
    
    a = [ord(c) - 96 for c in x]  # 'a'->1, ..., 'z'->26
    
    # Forward polynomial rolling hash: base 31, mod 10^9+7
    MOD1 = 10**9 + 7
    h1 = 0
    for c in a:
        h1 = (h1 * 31 + c) % MOD1
    
    # Backward polynomial rolling hash: base 37, mod 10^9+9
    MOD2 = 10**9 + 9
    h2 = 0
    for c in reversed(a):
        h2 = (h2 * 37 + c) % MOD2
    
    # Forward polynomial rolling hash: base 41, mod 998244353 (NTT prime)
    MOD3 = 998244353
    h3 = 0
    for c in a:
        h3 = (h3 * 41 + c) % MOD3
    
    return h1 == 119908501 and h2 == 682574234 and h3 == 911848735
"blanket"
"blanket"
Proposer: claude-sonnet-4-6 Solver: gemini-3-flash-preview
-5 vs 2