mulllhausen / visual-secp256k1View external linksLinks
visualize operations on the secp256k1 elliptic curve including point addition, multiplication, signing and verifying
☆32Jul 7, 2015Updated 10 years ago
Alternatives and similar repositories for visual-secp256k1
Users that are interested in visual-secp256k1 are comparing it to the libraries listed below
Sorting:
- Bruteforce to calculate private key over public key.☆14Nov 16, 2022Updated 3 years ago
- ☆10Dec 22, 2021Updated 4 years ago
- one of many proofs, ring signatures, and zerocoin algo from https://eprint.iacr.org/2014/764.pdf☆15Dec 12, 2022Updated 3 years ago
- Optimized C++ ECDSA verifier for secp256k1☆13Mar 21, 2013Updated 12 years ago
- CryptoKeyHunter is a Python script that generates an unlimited number of Bitcoin addresses and keys, checks them against a list of target…☆11Oct 8, 2024Updated last year
- Parse Bitcoin objects without allocations☆16Jan 19, 2025Updated last year
- Supporting evidence for security of the baby_jubjub curve to be used in altbn128, Ethereum☆41Aug 24, 2019Updated 6 years ago
- DEPRECATED☆22Jan 18, 2021Updated 5 years ago
- A python program that finds the public keys to a list of bitcoin addresses if they are known☆19Jun 4, 2024Updated last year
- ☆20Apr 3, 2021Updated 4 years ago
- a language optimized for state channels on blockchains.☆22Mar 9, 2021Updated 4 years ago
- A Rust library for working with Bitcoin Cash☆19Jun 28, 2020Updated 5 years ago
- Simply-typed lambda calculus (plus several features) -> x86 executables for Linux and Windows☆25Jan 25, 2013Updated 13 years ago
- Balzac is a domain-specific language to write Bitcoin transactions.☆26Jul 12, 2025Updated 7 months ago
- ☆28Jul 10, 2024Updated last year
- Генерация на GPU мнемонических фраз по алгоритму BIP32, преобразование в сид по SHA-512, генерация приватных ключей и адресов BIP32 по ал…☆30Nov 5, 2022Updated 3 years ago
- Brute-force the private key of a Bitcoin address☆55Apr 17, 2023Updated 2 years ago
- Learning how to bulletproofs☆38Dec 22, 2018Updated 7 years ago
- Lattice ECDSA attack☆143Jan 26, 2022Updated 4 years ago
- Related address generator.☆30May 1, 2015Updated 10 years ago
- Reference implementation of Curve25519 and Curve448 as specified in RFC7748☆10Jun 22, 2019Updated 6 years ago
- 💎 Virtual crypto exchange for testing purposes. API is compatible with major crypto exchanges.☆12Feb 14, 2019Updated 7 years ago
- Present Crypto Engine in Verilog☆11Feb 27, 2016Updated 9 years ago
- A C++ class that adds arbitrary precision integers aimed at high performance and ease of use. All you need to do is replace int with huge…☆11Mar 6, 2024Updated last year
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆45Mar 13, 2020Updated 5 years ago
- Ethereum Smart Contract - Proof of Work token☆10Jul 2, 2017Updated 8 years ago
- Sage implementation of the MAYO scheme☆14Feb 3, 2025Updated last year
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- Sample code for integrating LightWare rangefinders into various platforms.☆10Oct 22, 2025Updated 3 months ago
- Command-line executable to load a portfolio of cryptocoins from Poloniex☆11Feb 7, 2020Updated 6 years ago
- ☆11Jan 15, 2021Updated 5 years ago
- C++ library for Finite Fields and Elliptic Curves☆168Oct 5, 2021Updated 4 years ago
- ☆38Mar 20, 2017Updated 8 years ago
- ☆33May 20, 2021Updated 4 years ago
- Code to generate snark proofs for batch auction result validation of the Gnosis d.exchange☆46Jan 17, 2019Updated 7 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆41Aug 14, 2024Updated last year
- Performance Evaluation of SHA-256 using SHA New Instructions.☆42May 23, 2025Updated 8 months ago
- A Python based ECDSA secp256k1 private key recovery tool☆34Mar 18, 2024Updated last year
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago