ecdsa-cryptography
There are 97 repositories under ecdsa-cryptography topic.
Xor-el/CryptoLib4Pascal
Crypto for Modern Object Pascal
demining/CryptoDeepTools
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
bitlogik/lattice-attack
Lattice ECDSA attack
lucashenning/aws-kms-ethereum-signing
Typescript based example of ECDSA signing an Ethereum transaction with AWS KMS.
daedalus/bitcoin-recover-privkey
Proof of concept of bitcoin private key recovery using weak ECDSA signatures
enricobottazzi/designated-verifier-proof
Reusable component to add a designated verifier to your zk circom circuit. It means that the zk proof generated from your circuit cannot be verified by someonewho is not the designated verifier (identified by its ethereum public address)
Chainers/Cryptography.ECDSA
secp256k1 algorythm
demining/Lattice-Attack
One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins
hyugit/EllipticCurve
An elliptic curve library written in Swift 4
demining/Break-ECDSA-cryptography
The very first serious vulnerability in Blockchain and how to get the public key Bitcoin ECDSA RSZ value from the RawTX file
Adiprogrammer7/blockchain_implementation
Simple blockchain implementation using python and flask. It implements basic concepts of blockchain, like proof of work, mining, consensus, generating and validating the signature on transaction etc.
demining/MrRobotQR
«MrRobotQR» is an open source script that automates the process from entering a search keyword to deriving the private key of a Bitcoin wallet.
demining/Reduce-Private-Key
Reducing the private key through scalar multiplication using the ECPy + Google Colab library
Irdroid/authKi
Open Source Crypto Authentication USB Dongle
demining/Endomorphism-Secp256k1
Speed up secp256k1 with endomorphism
demining/Frey-Ruck-Attack
Implement Frey-Rück Attack to get the secret key “K” (NONCE) / Critical vulnerability in the Bitcoin
pedroalbanese/edgetk
🔒 Encrypted Data Gateway Engine - Command-line Integrated Security Suite written in Go (OpenSSL compliant)
demining/Bitcoin-Wallet-Recovery
Bitcoin Wallet Recovery via ECDSA Short Signatures
Infineon/arduino-optiga-trust-x
Infineon OPTIGA™ Trust X security solution library for Arduino
trident2710/Crypto
java library providing the implementation of ECDSA and useful algebraic structures such as finite fields
BlackHole-Consulting/blockchain-micropython
A blockchain micropython libraries for ECC, ECDSA and network with BITCOIN BTC, Ethereum, EOS
demining/Check-Bitcoin-Address-Balance
How to Convert Bitcoin-PUBKEY HEX Public Keys to Base58 Bitcoin Address and Check Balance for BTC Coins
demining/Polynonce-Attack
POLYNONCE ATTACK we use BITCOIN signatures as a Polynomial to an arbitrarily high power of 128 bits to get a Private Key
ibukisaar/CSharpSecp256k1
一个迷你快速的C# Secp256k1椭圆曲线算法
demining/Algorithms-For-Secp256k
Useful and efficient algorithms for secp256k1 elliptic curve
embetrix/stm32mp-sign-tool
The stm32mp-sign-tool is an utility for signing and verifying firmware images compatible with STM32MP MPUs
smartibase/Broadcast-Bitcoin-Transaction
Broadcasting Transactions into the Bitcoin Network.
gpappasv/stm32_bootloader
This is a repository that a custom stm32 secure bootloader is being developed.
demining/TeslaBrainWallet
Tesla BrainWallet traps from Bitcoin wallets beware of phishing and popular passphrases
demining/Vulnerable-to-Debian-OpenSSL-bug-CVE-2008-0166
Search for BTC coins on earlier versions of Bitcoin Core with critical vulnerability OpenSSL 0.9.8 CVE-2008-0166
ArcticTechnology/libsecp256k1-0
Compiled libsecp256k1 for using ECDSA signatures and secret/public key cryptography in your python projects.
Bujira/aws-kms-evm-signer
A deep dive into signing EVM transactions with an AWS KMS private key using JavaScript.
demining/Coingecko-Agent-Ftpupload
Coingecko & Agent Ftpupload create beautiful crypto wallet addresses, but keep the private key safe
demining/lattice-attack-249bits
LATTICE ATTACK 249bits we solve the problem of hidden numbers using 79 signatures ECDSA
demining/QIANSHI-quantum-computer
Cryptocurrency of Bitcoin against QIANSHI quantum computer from Chinese search engine giant Baidu Inc.
nickromandini/RingSignatureEllipticCurve
An implementation of Ring Signature using keys generated from Elliptic Curves. Signing algorithm written in Javascript. Verifying algorithm written in Python.