jonasnick / ecdsaPredictableNonce
Ethereum Bug Bounty Submission: Breaking ecdsa that uses `privKey xor message` as nonce.
☆31Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for ecdsaPredictableNonce
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆18Updated 2 years ago
- Recover the private key from signed DSA messages. (multiple signed messages, static coefficient 'k')☆38Updated 6 years ago
- Random collection of zero-knowledge stuff☆18Updated 6 years ago
- Ethereum key generator☆33Updated 6 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆27Updated 2 years ago
- ☆92Updated last year
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆40Updated last year
- "How to Run a Bitcoin Node" handout☆16Updated 2 years ago
- A lookup table for the discrete log in secp265k1☆21Updated 3 years ago
- Audit Proposals and Reports for RandomX☆12Updated 5 years ago
- ☆10Updated 7 years ago
- Lattice ECDSA attack☆117Updated 2 years ago
- An implementation for fair auditing and contingent payments in Bitcoin☆22Updated 7 years ago
- Visualize Bitcoin UTXO set☆42Updated 2 years ago
- These testcases are generated by running afl-fuzz against libbitcoinconsensus.☆15Updated 9 years ago
- Python module for sending bitcoin transaction directly to the bitcoin network☆16Updated 12 years ago
- Breaking ECDSA (not so broken) with LLL☆74Updated 5 months ago
- Supporting evidence for security of the Jubjub curve to be used in Zcash☆16Updated 3 years ago
- Bitcoin and Zcash wallets made simple - Javascript implementation of BIP 32 Bitcoin hierarchical deterministic keys☆21Updated 5 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆17Updated 7 months ago
- ☆11Updated 3 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 4 years ago
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Updated last year
- ☆11Updated 3 years ago
- visualize operations on the secp256k1 elliptic curve including point addition, multiplication, signing and verifying☆27Updated 9 years ago
- Designing Secure Cryptography☆21Updated 5 years ago
- supplement material for BlackHat2020 talk: Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets☆12Updated 4 years ago
- Research and implementation for non-interactive blockchain proofs of proofs of work☆49Updated 2 years ago
- Grin transaction data corresponding to research on transaction linkability☆52Updated 4 years ago