amintos / PyECCLinks
Pure Python implementation of an elliptic curve cryptosystem based on FIPS 186-3. WARNING: This Project is de-facto unmaintained since 2012, algorithms are intended for demonstration and teaching and can be easily broken using side-channel attacks when deployed productively!
☆20Updated 10 years ago
Alternatives and similar repositories for PyECC
Users that are interested in PyECC are comparing it to the libraries listed below
Sorting:
- Optimized C library for EC operations on curve secp256k1☆47Updated last week
- Python implementation of Schoof's algorithm for counting the points on elliptic curves over finite fields☆43Updated 6 years ago
- visualize operations on the secp256k1 elliptic curve including point addition, multiplication, signing and verifying☆32Updated 10 years ago
- Python library for fast elliptic curve crypto☆289Updated last month
- Equihash solver port from C++ to C for Zcash☆33Updated 8 years ago
- python files from the blackboard 101 series on world bitcoin network☆203Updated 8 years ago
- Python Bitcoin Node☆123Updated 10 years ago
- Optimized C++ ECDSA verifier for secp256k1☆13Updated 12 years ago
- ☆60Updated 8 years ago
- ECDSA encryption☆30Updated 11 years ago
- very fast (NOT SECURE) implementation of arithmetic on curve secp256k1 on x86_64☆24Updated 5 years ago
- KeccakTools is a set of C++ classes that can help analyze the Keccak sponge function family, designed by Guido Bertoni, Joan Daemen, Mich…☆187Updated 7 years ago
- The proof-of-work algorithm for Zcash☆83Updated 8 years ago
- Zerocoin: C++ lib for anonymous extension to bitcoin☆177Updated 5 years ago
- Safest and fastest Python library for secp256k1 elliptic curve operations☆176Updated 2 months ago
- Fork of secp256k1-zkp for the Grin/MimbleWimble project☆33Updated 2 years ago
- Technical paper on the Borromean ring signature construction☆47Updated 8 years ago
- NTRU Python Library with Application to Encrypted Domain☆32Updated 8 months ago
- ☆53Updated 11 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆41Updated last year
- multi-parameter Equihash proof-of-work multi-threaded C solvers☆156Updated 5 years ago
- Learning how to bulletproofs☆38Updated 7 years ago
- ☆454Updated 2 years ago
- ☆79Updated 9 years ago
- Pay for the solution to a sudoku puzzle with a zero-knowledge contingent payment☆104Updated 8 years ago
- ☆36Updated 8 years ago
- 2P-ECDSA: Two-Party ECDSA MultiSignatures☆48Updated 6 years ago
- pure-python routines for curve25519/ed25519☆37Updated 6 years ago
- A place for research. Assume nothing is ready for production.☆21Updated 4 years ago
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Updated 3 years ago