Pure Python implementation of an elliptic curve cryptosystem based on FIPS 186-3. WARNING: This Project is de-facto unmaintained since 2012, algorithms are intended for demonstration and teaching and can be easily broken using side-channel attacks when deployed productively!
☆20Nov 20, 2015Updated 10 years ago
Alternatives and similar repositories for PyECC
Users that are interested in PyECC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆40Aug 14, 2024Updated last year
- Multiplying... backward?☆14Jul 22, 2020Updated 5 years ago
- Rust language bindings for Bitcoin secp256k1 library.☆17Jan 17, 2020Updated 6 years ago
- Vanitygen plus! Generate vanity address for 80+ cryptocoins including: BTC, LTC, LBRY, UNO, DASH, DOGE, FEATHER, GROESTL, MONA, PEERCOIN,…☆13Feb 7, 2017Updated 9 years ago
- A C++ class that adds arbitrary precision integers aimed at high performance and ease of use. All you need to do is replace int with huge…☆12Mar 6, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Изучение C++ и алгоритмов CV на спец. курсе для 11 классов ФМЛ №239☆10Sep 5, 2024Updated last year
- Bloom filter alternative (C++)☆18Nov 8, 2018Updated 7 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- Bitcoin private key brute force written in Python☆11Aug 22, 2022Updated 3 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆10Oct 29, 2019Updated 6 years ago
- Brute force Bitcoin Public keys for puzzles.☆12Dec 24, 2021Updated 4 years ago
- A beginner's guide to computer programming (2006)☆12Aug 10, 2018Updated 7 years ago
- PoC implementation of Gallois Field, Paillier, DSA, ECDSA, and curve secp256k1 with an adapted scheme of "Two-party generation of DSA si…☆13Feb 5, 2018Updated 8 years ago
- Elliptic Curve Cryptography☆13Mar 23, 2010Updated 16 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Basic Arithmetic or Advanced Cryptographic Protocols, SECP256k2 Provides the Essential Functions Needed for Modern Cryptography Generatin…☆10Jul 30, 2024Updated last year
- Library for elliptic curve (ECDSA) private keys, public keys, and bitcoin addresses.☆14Mar 11, 2025Updated last year
- Implementation of the parallel Pollard's rho method for solving the Elliptic Curve Discrete Logarithm Problem (ECDLP).☆11Mar 14, 2015Updated 11 years ago
- ☆21Jul 31, 2019Updated 6 years ago
- Supports Multi GPU☆11Jun 9, 2020Updated 5 years ago
- Optimized C++ ECDSA verifier for secp256k1☆12Mar 21, 2013Updated 13 years ago
- Pollard-Rho-kangaroo solved cuda☆14Oct 9, 2019Updated 6 years ago
- Implementation of the Pollard's Rho Lambda Algorithm for the secp256k1 curve.☆20Apr 19, 2026Updated last month
- KeyQuest is a high-performance, CPU-based Bitcoin private-key search tool that leverages AVX2/512 and OpenMP to scan a specified hex rang…☆13Jun 14, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool for cracking Bitcoin private keys☆11Feb 3, 2022Updated 4 years ago
- ☆12Jun 20, 2024Updated last year
- Python implementation of Schoof's algorithm for counting the points on elliptic curves over finite fields☆43Jun 2, 2019Updated 6 years ago
- A powerful solution for tackling the Elliptic Curve Discrete Logarithm Problem (ECDLP) within the context of secp256k1.☆12May 12, 2026Updated last week
- Find all solutions to SUBSET-SUM, including negative, positive, and repeating numbers☆17Jan 24, 2024Updated 2 years ago
- vIPer: a new tool for IPython notebooks.☆60Jan 7, 2015Updated 11 years ago
- Solve discrete logarithm problems by the number field sieve method.☆19Aug 30, 2017Updated 8 years ago
- Fastest CUDA SIFT or other 128-float vector matcher for computer vision☆27Mar 23, 2021Updated 5 years ago
- CryptoKeyHunter is a Python script that generates an unlimited number of Bitcoin addresses and keys, checks them against a list of target…☆12Oct 8, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Tools for btc hacking☆15Feb 21, 2021Updated 5 years ago
- Algorand Implementation☆11Oct 3, 2017Updated 8 years ago
- Benchmarking Bloom, Cuckoo, Morton, and PD based filter.☆15Mar 19, 2022Updated 4 years ago
- Kangaroo with the goal of improving efficiency without losing the success rate.☆17Dec 13, 2024Updated last year
- ☆34Apr 22, 2026Updated 3 weeks ago
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆44Nov 19, 2025Updated 6 months ago
- FM-index is the fastest full text search algorithm using a compressed index file. This is FM-index for JSX/JS/AMD/Common.js.☆11Nov 9, 2013Updated 12 years ago