demining / Endomorphism-Secp256k1View external linksLinks
Speed up secp256k1 with endomorphism
☆14Dec 7, 2022Updated 3 years ago
Alternatives and similar repositories for Endomorphism-Secp256k1
Users that are interested in Endomorphism-Secp256k1 are comparing it to the libraries listed below
Sorting:
- Pollard’s Kangaroo find solutions to the discrete logarithm secp256k1 PRIVATE KEY + NONCES in a known range☆36Dec 7, 2022Updated 3 years ago
- Bitcoin Wallet Recovery via ECDSA Short Signatures☆12Dec 7, 2022Updated 3 years ago
- How to Convert Bitcoin-PUBKEY HEX Public Keys to Base58 Bitcoin Address and Check Balance for BTC Coins☆11Aug 26, 2022Updated 3 years ago
- Reducing the private key through scalar multiplication using the ECPy + Google Colab library☆14Dec 7, 2022Updated 3 years ago
- One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins☆31Dec 7, 2022Updated 3 years ago
- Implement Frey-Rück Attack to get the secret key “K” (NONCE) / Critical vulnerability in the Bitcoin☆13Dec 7, 2022Updated 3 years ago
- The very first serious vulnerability in Blockchain and how to get the public key Bitcoin ECDSA RSZ value from the RawTX file☆20Dec 7, 2022Updated 3 years ago
- verify cairo execution in Halo2☆15Sep 12, 2023Updated 2 years ago
- Elliptic curve mathematics including Tate and Weil pairings for BLS signatures and zk-SNARK algorithms.☆21Feb 24, 2025Updated 11 months ago
- ☆33May 20, 2021Updated 4 years ago
- ☆21Apr 16, 2023Updated 2 years ago
- BabyJubJub elliptic curve implementation and EdDSA signature scheme in Rust☆45Jan 22, 2024Updated 2 years ago
- Open-Source Libraries for Circom by ABDK Consulting☆19Dec 22, 2019Updated 6 years ago
- ZK Fixed Point Arithmetic with its Application in Machine Learning based on Halo2☆21Oct 23, 2023Updated 2 years ago
- Breaking ECDSA (not so broken) with LLL☆91Nov 4, 2025Updated 3 months ago
- Implementation of the Grumpkin curve in Rust.☆29Jul 5, 2023Updated 2 years ago
- A curated list of awesome resources for learning and programming with Circom☆23May 15, 2023Updated 2 years ago
- Attempt to search unsolved 84 puzzles keys of 1000 BTC☆28Jun 27, 2024Updated last year
- Bitcoin addresses bruteforce tool via GPU OpenCL☆62Jan 25, 2018Updated 8 years ago
- Polyexen demo of Plonkish Arithmetiation Format (Plaf) on the zkevm-circuits☆31Feb 16, 2024Updated last year
- ☆33Sep 22, 2023Updated 2 years ago
- Bitcoin and Altcoins Publickey subtracter☆54Jun 26, 2024Updated last year
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks, C99☆24Oct 10, 2019Updated 6 years ago
- Brute-force the private key of a Bitcoin address☆55Apr 17, 2023Updated 2 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks☆60Oct 4, 2019Updated 6 years ago
- An open-source session replay tool for single-page applications that uses AI analysis, aggregated trends, and a RAG chatbot to help devel…☆11Jan 23, 2026Updated 3 weeks ago
- Lattice ECDSA attack☆143Jan 26, 2022Updated 4 years ago
- Pairing cryptography library in Rust☆35Jan 18, 2024Updated 2 years ago
- Crypto Gadgets for Plonky2☆77May 16, 2024Updated last year
- ☆28Dec 8, 2021Updated 4 years ago
- ☆10Jun 29, 2022Updated 3 years ago
- Este projeto é fruto de um estudo pessoal sobre o algoritmo Secp256k1. O objetivo dele é conseguir obter, usando apenas os valores da cha…☆12Dec 7, 2022Updated 3 years ago
- Includes several examples of data manipulation techniques by using PySpark and machine learning algorithms using MLib☆10Jun 14, 2021Updated 4 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆45Mar 13, 2020Updated 5 years ago
- Baby Step Giant Step for SECPK1☆72Apr 20, 2020Updated 5 years ago
- VanitySearch, v1.15.4, fork, fix - bitcrack☆37Jun 1, 2020Updated 5 years ago
- an introduction to noir, with simple examples☆44Jan 8, 2024Updated 2 years ago
- ☆10Aug 16, 2022Updated 3 years ago
- ☆16Nov 29, 2024Updated last year