jonasnick / ecdsaPredictableNonceLinks
Ethereum Bug Bounty Submission: Breaking ecdsa that uses `privKey xor message` as nonce.
☆32Updated 3 years ago
Alternatives and similar repositories for ecdsaPredictableNonce
Users that are interested in ecdsaPredictableNonce are comparing it to the libraries listed below
Sorting:
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆19Updated 3 years ago
- ☆112Updated 2 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆46Updated 3 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆32Updated 3 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 3 years ago
- ☆41Updated 3 years ago
- Grin transaction data corresponding to research on transaction linkability☆53Updated 5 years ago
- Tool for generating Elliptic curve domain parameters☆130Updated 2 weeks ago
- Differential fuzzing for elliptic curves☆24Updated 2 years ago
- Research and implementation for non-interactive blockchain proofs of proofs of work☆50Updated 3 years ago
- ☆17Updated 2 years ago
- Optimized Binary GCD for Modular Inversion☆45Updated 5 years ago
- Fork of secp256k1-zkp for the Grin/MimbleWimble project☆33Updated 2 years ago
- ☆60Updated 8 years ago
- Tool for auditing Ethereum contracts☆55Updated 8 years ago
- http://hackthiscontract.io/☆50Updated 3 years ago
- Bounds on divsteps iterations in safegcd☆55Updated last year
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Updated 2 years ago
- Random collection of zero-knowledge stuff☆14Updated 7 years ago
- Cryptanalysis of the Legendre PRF Challenges☆11Updated 6 years ago
- List of crackpot 'scientists' and 'thinkers'☆20Updated 5 months ago
- Crypto Audit Guidelines☆134Updated 4 years ago
- High Assurance Cryptographic Software☆10Updated last month
- An implementation for fair auditing and contingent payments in Bitcoin☆23Updated 8 years ago
- Framework for cryptoeconomic contract security, decentralized security bounties. Live on Ethereum.☆73Updated 7 years ago
- ☆27Updated 5 years ago
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆81Updated 3 weeks ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- resource exhaustion vulnerabilities in PoSv3 cryptocurrencies☆24Updated 3 years ago
- Designing Secure Cryptography☆22Updated 6 years ago