Pure Python implementation of an elliptic curve cryptosystem based on FIPS 186-3. WARNING: This Project is de-facto unmaintained since 2012, algorithms are intended for demonstration and teaching and can be easily broken using side-channel attacks when deployed productively!
☆20Nov 20, 2015Updated 10 years ago
Alternatives and similar repositories for PyECC
Users that are interested in PyECC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆40Aug 14, 2024Updated last year
- Multiplying... backward?☆14Jul 22, 2020Updated 5 years ago
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 4 months ago
- Vanitygen plus! Generate vanity address for 80+ cryptocoins including: BTC, LTC, LBRY, UNO, DASH, DOGE, FEATHER, GROESTL, MONA, PEERCOIN,…☆13Feb 7, 2017Updated 9 years ago
- A C++ class that adds arbitrary precision integers aimed at high performance and ease of use. All you need to do is replace int with huge…☆12Mar 6, 2024Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Elliptic Curve Cryptography playground/toolkit written in pure Python☆70Dec 5, 2022Updated 3 years ago
- C library for ECC-SM2 public encrypt☆10Dec 17, 2016Updated 9 years ago
- Bitcoin private key brute force written in Python☆11Aug 22, 2022Updated 3 years ago
- Brute force Bitcoin Public keys for puzzles.☆12Dec 24, 2021Updated 4 years ago
- Elliptic Curve Cryptography☆13Mar 23, 2010Updated 16 years ago
- POSTECH: Heterogeneous Parallel Computing (Fall 2023)☆19Dec 9, 2023Updated 2 years ago
- Basic Arithmetic or Advanced Cryptographic Protocols, SECP256k2 Provides the Essential Functions Needed for Modern Cryptography Generatin…☆10Jul 30, 2024Updated last year
- Library for elliptic curve (ECDSA) private keys, public keys, and bitcoin addresses.☆14Mar 11, 2025Updated last year
- Implementation of the parallel Pollard's rho method for solving the Elliptic Curve Discrete Logarithm Problem (ECDLP).☆11Mar 14, 2015Updated 11 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Library to show secp256k1 curve's mirror called "secq"☆14Aug 6, 2018Updated 7 years ago
- Supports Multi GPU☆11Jun 9, 2020Updated 5 years ago
- kangaroo_address/ bitcrack_keyhunt_☆19Aug 12, 2023Updated 2 years ago
- Optimized C++ ECDSA verifier for secp256k1☆12Mar 21, 2013Updated 13 years ago
- Pollard-Rho-kangaroo solved cuda☆14Oct 9, 2019Updated 6 years ago
- ☆22Dec 28, 2014Updated 11 years ago
- Implementation of the Pollard's Rho Lambda Algorithm for the secp256k1 curve.☆20Apr 19, 2026Updated last week
- A tool for cracking Bitcoin private keys☆11Feb 3, 2022Updated 4 years ago
- ☆12Jun 20, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- 32btc bounty address search on GPU☆19Jan 2, 2024Updated 2 years ago
- A powerful solution for tackling the Elliptic Curve Discrete Logarithm Problem (ECDLP) within the context of secp256k1.☆11Dec 13, 2025Updated 4 months ago
- Find all solutions to SUBSET-SUM, including negative, positive, and repeating numbers☆17Jan 24, 2024Updated 2 years ago
- vIPer: a new tool for IPython notebooks.☆60Jan 7, 2015Updated 11 years ago
- Tools for btc hacking☆14Feb 21, 2021Updated 5 years ago
- Parser of ssh public and private keys☆12Apr 7, 2020Updated 6 years ago
- CryptoKeyHunter is a Python script that generates an unlimited number of Bitcoin addresses and keys, checks them against a list of target…☆11Oct 8, 2024Updated last year
- Bruteforce to calculate private key over public key.☆15Nov 16, 2022Updated 3 years ago
- 基于secp256k1椭圆曲线的加密解密(iOS)☆16Jan 12, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Algorand Implementation☆11Oct 3, 2017Updated 8 years ago
- Benchmarking Bloom, Cuckoo, Morton, and PD based filter.☆15Mar 19, 2022Updated 4 years ago
- Kangaroo with the goal of improving efficiency without losing the success rate.☆17Dec 13, 2024Updated last year
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆45Nov 19, 2025Updated 5 months ago
- FM-index is the fastest full text search algorithm using a compressed index file. This is FM-index for JSX/JS/AMD/Common.js.☆11Nov 9, 2013Updated 12 years ago
- Fast 64 bit evolved hash.☆34Apr 4, 2017Updated 9 years ago
- IPython/Jupiter kernel for Racket and Gamble.☆10May 1, 2018Updated 7 years ago