Pure Python implementation of an elliptic curve cryptosystem based on FIPS 186-3. WARNING: This Project is de-facto unmaintained since 2012, algorithms are intended for demonstration and teaching and can be easily broken using side-channel attacks when deployed productively!
☆20Nov 20, 2015Updated 10 years ago
Alternatives and similar repositories for PyECC
Users that are interested in PyECC are comparing it to the libraries listed below
Sorting:
- ECDSA encryption☆30Sep 16, 2014Updated 11 years ago
- Rust language bindings for Bitcoin secp256k1 library.☆17Jan 17, 2020Updated 6 years ago
- pure-python routines for curve25519/ed25519☆38Feb 6, 2020Updated 6 years ago
- Vanitygen plus! Generate vanity address for 80+ cryptocoins including: BTC, LTC, LBRY, UNO, DASH, DOGE, FEATHER, GROESTL, MONA, PEERCOIN,…☆13Feb 7, 2017Updated 9 years ago
- Изучение C++ и алгоритмов CV на спец. курсе для 11 классов ФМЛ №239☆10Sep 5, 2024Updated last year
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆41Aug 14, 2024Updated last year
- ☆12Apr 8, 2021Updated 4 years ago
- Algorand Implementation☆11Oct 3, 2017Updated 8 years ago
- This is a software for copy paste move and delete writter in C#☆13Aug 12, 2016Updated 9 years ago
- Node.js bindings for Gnu Privacy Guard☆23Oct 4, 2012Updated 13 years ago
- Raspberry pi internet radio and mp3 player with bluetooth.☆10Apr 30, 2020Updated 5 years ago
- Brute force Bitcoin Public keys for puzzles.☆12Dec 24, 2021Updated 4 years ago
- Easy typing of Unicode symbols in Emacs, tailored for Haskell sources☆14Sep 5, 2011Updated 14 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- IPython/Jupiter kernel for Racket and Gamble.☆10May 1, 2018Updated 7 years ago
- Parser of ssh public and private keys☆12Apr 7, 2020Updated 5 years ago
- QuTrunk is free, open source, cross platform quantum computing programming framework, including quantum programming API, quantum command …☆17Dec 18, 2023Updated 2 years ago
- Python implementation of Schoof's algorithm for counting the points on elliptic curves over finite fields☆43Jun 2, 2019Updated 6 years ago
- Implementation of the Tonelli-Shanks algorithm for computing square roots modulo a prime number.☆12Oct 9, 2022Updated 3 years ago
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 2 months ago
- ☆12Oct 12, 2022Updated 3 years ago
- LibP2P networking library written in Rust☆12Dec 29, 2021Updated 4 years ago
- vIPer: a new tool for IPython notebooks.☆60Jan 7, 2015Updated 11 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆10Oct 29, 2019Updated 6 years ago
- Basic Arithmetic or Advanced Cryptographic Protocols, SECP256k2 Provides the Essential Functions Needed for Modern Cryptography Generatin…☆10Jul 30, 2024Updated last year
- KeyQuest is a high-performance, CPU-based Bitcoin private-key search tool that leverages AVX2/512 and OpenMP to scan a specified hex rang…☆13Jun 14, 2025Updated 8 months ago
- POSTECH: Heterogeneous Parallel Computing (Fall 2023)☆19Dec 9, 2023Updated 2 years ago
- This is a extension for Ethereum based tokens, which added an build-in exchange.☆10Sep 23, 2025Updated 5 months ago
- OUTDATED, see here - https://github.com/luxonis/depthai-gui☆10Aug 4, 2020Updated 5 years ago
- Python port to BlackBerry 10☆14Oct 29, 2012Updated 13 years ago
- kangaroo_address/ bitcrack_keyhunt_☆19Aug 12, 2023Updated 2 years ago
- Multiplying... backward?☆14Jul 22, 2020Updated 5 years ago
- Elliptic Curve Cryptography☆13Mar 23, 2010Updated 15 years ago
- Libsodium for Android 4.3+☆10Jun 8, 2016Updated 9 years ago
- A PAC file simulating the effect of GFW.☆11Jan 3, 2015Updated 11 years ago
- Python wrapper around Yuta Mori's implementation of SA-IS suffix array construction.☆12Oct 26, 2012Updated 13 years ago
- Experiments for "Scaling read aligners to hundreds of threads on general-purpose processors"☆11Jun 8, 2018Updated 7 years ago
- 国密SM2/SM3/SM4加解密工具☆14May 9, 2022Updated 3 years ago
- ☆12Jun 20, 2024Updated last year