PoC implementation of Gallois Field, Paillier, DSA, ECDSA, and curve secp256k1 with an adapted scheme of "Two-party generation of DSA signatures" by MacKenzie and Reiter
☆13Feb 5, 2018Updated 8 years ago
Alternatives and similar repositories for poc-threshold-ecdsa-secp256k1
Users that are interested in poc-threshold-ecdsa-secp256k1 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Minimalistic implementation of a Verifiable (t, n) threshold signature scheme based on elliptic curve with python.☆30Mar 27, 2026Updated 3 weeks ago
- ECDSA nonce-reuse attack to recover a private key.☆50Mar 27, 2026Updated 3 weeks ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks, C99☆24Oct 10, 2019Updated 6 years ago
- Multiplying... backward?☆14Jul 22, 2020Updated 5 years ago
- rnn/lstm to generate private keys from public keys of known high value☆38Jan 7, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- full quite to turn you seed keys into a private key, bitcoin address, then search for matching wallets with positive balance☆10Mar 31, 2024Updated 2 years ago
- A keyless Bitcoin/Libra wallet service powered by Secure Two-Party ECDSA/Ed25519 and Zero Knowledge, Wallet Rebuilt for Security☆21Aug 17, 2019Updated 6 years ago
- ☆70Dec 13, 2021Updated 4 years ago
- A C++ class that adds arbitrary precision integers aimed at high performance and ease of use. All you need to do is replace int with huge…☆12Mar 6, 2024Updated 2 years ago
- GitHub Stats is all about stars, forks, repos, followers and more☆12Dec 5, 2017Updated 8 years ago
- Изучение C++ и алгоритмов CV на спец. курсе для 11 классов ФМЛ №239☆10Sep 5, 2024Updated last year
- C library for ECC-SM2 public encrypt☆10Dec 17, 2016Updated 9 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆11Feb 15, 2021Updated 5 years ago
- Reducing the private key through scalar multiplication using the ECPy + Google Colab library☆13Dec 7, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- The project is open-sourced and funded by Binance Lab.☆108Dec 11, 2019Updated 6 years ago
- Bitcoin private key brute force written in Python☆11Aug 22, 2022Updated 3 years ago
- The bridge is able to transfer an ERC20 tokens on an EVM-based chain to BEP2 to the Binance Chain and vice versa.☆25Nov 10, 2023Updated 2 years ago
- nmapcli is a tool written in Python with pre-defined scan templates to automate Nmap scans☆11Sep 10, 2017Updated 8 years ago
- ios app signature server,Using the Apple Undisclosed Web Interface Signing Application.☆10Apr 21, 2019Updated 6 years ago
- Sample to Bitcoin Address Validation☆10Nov 24, 2018Updated 7 years ago
- A beginner's guide to computer programming (2006)☆12Aug 10, 2018Updated 7 years ago
- ☆10Jun 28, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Hacking bitcoin private keys☆17Aug 25, 2020Updated 5 years ago
- Basic Arithmetic or Advanced Cryptographic Protocols, SECP256k2 Provides the Essential Functions Needed for Modern Cryptography Generatin…☆10Jul 30, 2024Updated last year
- Secure Monero cold wallets for the truly paranoid ❄❄❄☆17Jan 21, 2018Updated 8 years ago
- Library for elliptic curve (ECDSA) private keys, public keys, and bitcoin addresses.☆14Mar 11, 2025Updated last year
- Rust library for Hierarchical Deterministic Path (BIP32, BIP43, BIP44, BIP49, BIP84)☆13May 5, 2025Updated 11 months ago
- How Jason Bourne Stores His Bitcoin in 2021☆15Jan 22, 2022Updated 4 years ago
- Lua scripts for interacting with TVTropes☆13Apr 29, 2011Updated 14 years ago
- Parse and build simple ELFs (useful for mapping memory to load into IDA and other disassemblers)☆17Sep 19, 2023Updated 2 years ago
- Library to show secp256k1 curve's mirror called "secq"☆14Aug 6, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 2P-ECDSA: Two-Party ECDSA MultiSignatures☆48May 3, 2019Updated 6 years ago
- kangaroo_address/ bitcrack_keyhunt_☆19Aug 12, 2023Updated 2 years ago
- Supports Multi GPU☆11Jun 9, 2020Updated 5 years ago
- My script to setup a "secure" base Linux install on a VPS server .....☆10Apr 3, 2026Updated 2 weeks ago
- shell scripts☆16Jul 22, 2017Updated 8 years ago
- A simple AV demo in iOS using facial recognition and the laughing man logo.☆20Feb 7, 2012Updated 14 years ago
- Implementation of the Pollard's Rho Lambda Algorithm for the secp256k1 curve.☆20Updated this week