fpgaminer / python-hmac-drbg
A Python implementation of HMAC_DRBG (see, NiST SP 800-90A).
☆14Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for python-hmac-drbg
- A PRF with low multiplicative complexity☆21Updated 4 years ago
- Random collection of zero-knowledge stuff☆18Updated 6 years ago
- ☆35Updated 9 years ago
- My poster for Financial Crypto 2020 analysing the hash function requirements for Taproot to be secure in the generic group model.☆11Updated 4 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Updated last year
- Lightning Network Simulator☆24Updated 3 years ago
- Batch Dual Execution framework for secure multiparty computation☆14Updated 7 years ago
- One-Time Verifiably Encrypted Signatures A.K.A. Adaptor Signatures☆25Updated 4 years ago
- 2P-ECDSA: Two-Party ECDSA MultiSignatures☆47Updated 5 years ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- ☆26Updated 6 years ago
- Online Debugging tool for Bitcoin script language☆18Updated 8 years ago
- Wasabi Research Club☆40Updated last year
- Simulation framework for non-standard mining strategies☆54Updated 2 years ago
- A python script computing the entropy of Bitcoin transactions and the linkability of their inputs and outputs.☆70Updated 4 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Updated 8 years ago
- Breaking ECDSA (not so broken) with LLL☆73Updated 4 months ago
- Frontend of Boltz (2019-2020)☆20Updated last year
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆27Updated 2 years ago
- Lightning BOLT Protocol Test Framework☆58Updated 2 weeks ago
- ☆49Updated this week
- Python FFI bindings for libsecp256k1 (maintained)☆57Updated 4 months ago
- A collection of scripts to steal BTC from Lightning Network enabled custodial services. Only for educational purpose! Share your findings…☆17Updated 3 years ago
- Prototype bitcoin vault: cold storage and theft minimization☆53Updated 2 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 7 years ago
- Taproot security proof☆23Updated 4 years ago
- Bitcoind with tor and electrum personal server and openVPN inside several docker containers☆11Updated 5 years ago
- ☆32Updated 2 years ago
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆18Updated 2 years ago