HareInWeed / gec
elliptic curve cryptography with GPU acceleration
☆16Updated last year
Related projects ⓘ
Alternatives and complementary repositories for gec
- ☆92Updated last year
- Attacks on ECDSA/SM2 signing algorithms☆15Updated 5 years ago
- Breaking ECDSA (not so broken) with LLL☆73Updated 4 months ago
- Source code of "GPU-accelerated elliptic curve digital signature algorithms", accepted by SC'22 - by Zonghao Feng, Qipeng Xie, Qiong Luo,…☆22Updated 2 years ago
- Cuda Secp256k1 Brain Wallet Recovery Tool☆42Updated 2 months ago
- Lattice ECDSA attack☆118Updated 2 years ago
- Baby Step Giant Step for SECPK1☆56Updated 4 years ago
- very fast (NOT SECURE) implementation of arithmetic on curve secp256k1 on x86_64☆19Updated 4 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks☆53Updated 5 years ago
- Tools for computing Elliptic Curve interval discrete logarithms using Pollard's lambda algorithm☆24Updated 4 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks, C99☆21Updated 5 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆27Updated 2 years ago
- Simple tool to calculate sha256 on GPU using Cuda☆85Updated 3 months ago
- A Python based ECDSA secp256k1 private key recovery tool☆29Updated 7 months ago
- A fast and unsafe version of an optimized C library for EC operations on curve secp256k1☆21Updated last year
- Tool for computing elliptic curve (EC) discrete logarithms☆34Updated 7 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆37Updated 2 months ago
- ☆46Updated last year
- ☆27Updated 3 years ago
- Accelerating bitcoin's ECDSA - implemented in C and OpenCL for GPUs☆50Updated 4 years ago
- Pollard’s Kangaroo find solutions to the discrete logarithm secp256k1 PRIVATE KEY + NONCES in a known range☆25Updated last year
- Interactive examples explaining the details of how bitcoin calculations work.☆25Updated 8 months ago
- Brute force BIP-39 Mnemonic using CPU☆119Updated 4 years ago
- A lookup table for the discrete log in secp265k1☆21Updated 3 years ago
- visualize operations on the secp256k1 elliptic curve including point addition, multiplication, signing and verifying☆25Updated 9 years ago
- SAT-based, MILP, and belief propagation preimage attacks on SHA-256 and other cryptographic hash functions☆36Updated last year
- Kangaroo cuda solver for SECP256K1☆20Updated last year
- Generate BTC address pair that share the same prefix☆63Updated 4 years ago