Optimized C++ ECDSA verifier for secp256k1
☆12Mar 21, 2013Updated 13 years ago
Alternatives and similar repositories for secp256k1
Users that are interested in secp256k1 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC implementation of Gallois Field, Paillier, DSA, ECDSA, and curve secp256k1 with an adapted scheme of "Two-party generation of DSA si…☆13Feb 5, 2018Updated 8 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks, C99☆24Oct 10, 2019Updated 6 years ago
- Multiplying... backward?☆14Jul 22, 2020Updated 5 years ago
- String Distances in rust☆14Nov 21, 2022Updated 3 years ago
- Raw transaction decoder for BNB, BTC☆10Aug 15, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆53Oct 13, 2014Updated 11 years ago
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 4 months ago
- Generate ethereum address with GPU (cuda)☆32Sep 18, 2025Updated 7 months ago
- Vanitygen plus! Generate vanity address for 80+ cryptocoins including: BTC, LTC, LBRY, UNO, DASH, DOGE, FEATHER, GROESTL, MONA, PEERCOIN,…☆13Feb 7, 2017Updated 9 years ago
- A C++ class that adds arbitrary precision integers aimed at high performance and ease of use. All you need to do is replace int with huge…☆12Mar 6, 2024Updated 2 years ago
- REPO IS RENAMED AND MOVED TO MICRO-BITCOIN☆25Jul 7, 2019Updated 6 years ago
- C library for ECC-SM2 public encrypt☆10Dec 17, 2016Updated 9 years ago
- Reducing the private key through scalar multiplication using the ECPy + Google Colab library☆13Dec 7, 2022Updated 3 years ago
- Bloom filter alternative (C++)☆18Nov 8, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆10Oct 29, 2019Updated 6 years ago
- visualize operations on the secp256k1 elliptic curve including point addition, multiplication, signing and verifying☆33Jul 7, 2015Updated 10 years ago
- Sample to Bitcoin Address Validation☆10Nov 24, 2018Updated 7 years ago
- A beginner's guide to computer programming (2006)☆12Aug 10, 2018Updated 7 years ago
- Elliptic Curve Cryptography☆13Mar 23, 2010Updated 16 years ago
- POSTECH: Heterogeneous Parallel Computing (Fall 2023)☆19Dec 9, 2023Updated 2 years ago
- Public Key Infrastructure for R based on the X.509 standard☆16Apr 8, 2026Updated 3 weeks ago
- How Jason Bourne Stores His Bitcoin in 2021☆15Jan 22, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Basic Arithmetic or Advanced Cryptographic Protocols, SECP256k2 Provides the Essential Functions Needed for Modern Cryptography Generatin…☆10Jul 30, 2024Updated last year
- Implementation of the parallel Pollard's rho method for solving the Elliptic Curve Discrete Logarithm Problem (ECDLP).☆11Mar 14, 2015Updated 11 years ago
- ☆21Jul 31, 2019Updated 6 years ago
- Supports Multi GPU☆11Jun 9, 2020Updated 5 years ago
- Implementation of the Pollard's Rho Lambda Algorithm for the secp256k1 curve.☆20Apr 19, 2026Updated last week
- KeyQuest is a high-performance, CPU-based Bitcoin private-key search tool that leverages AVX2/512 and OpenMP to scan a specified hex rang…☆13Jun 14, 2025Updated 10 months ago
- A tool for cracking Bitcoin private keys☆11Feb 3, 2022Updated 4 years ago
- ☆13Sep 1, 2022Updated 3 years ago
- Sample to Bitcoin Address Generation☆15Nov 14, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Pure Python implementation of an elliptic curve cryptosystem based on FIPS 186-3. WARNING: This Project is de-facto unmaintained since 20…☆20Nov 20, 2015Updated 10 years ago
- 32btc bounty address search on GPU☆19Jan 2, 2024Updated 2 years ago
- Tools for btc hacking☆14Feb 21, 2021Updated 5 years ago
- android在线音乐播放器-本科课程大作业☆12Apr 26, 2022Updated 4 years ago
- CryptoKeyHunter is a Python script that generates an unlimited number of Bitcoin addresses and keys, checks them against a list of target…☆11Oct 8, 2024Updated last year
- Bruteforce to calculate private key over public key.☆15Nov 16, 2022Updated 3 years ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 6 years ago