Solve discrete logarithm problems by the number field sieve method.
☆19Aug 30, 2017Updated 8 years ago
Alternatives and similar repositories for dlog-nfs
Users that are interested in dlog-nfs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Solve discrete logarithm problems by the index calculus method.☆16Aug 30, 2017Updated 8 years ago
- Speed up secp256k1 with endomorphism☆14Dec 7, 2022Updated 3 years ago
- Lattice reduction technique☆10Oct 14, 2014Updated 11 years ago
- Implementation of the Pollard's Rho Lambda Algorithm for the secp256k1 curve.☆20Apr 19, 2026Updated 2 weeks ago
- A COLLECTION OF ALGORITHMS RELATED TO NUMBER THEORY☆17Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆20Apr 3, 2021Updated 5 years ago
- The 2016 Crypto and Privacy Village Blinkybadge☆12Sep 7, 2016Updated 9 years ago
- Brute-force the private key of a Bitcoin address☆55Apr 17, 2023Updated 3 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- A fast and unsafe version of an optimized C library for EC operations on curve secp256k1☆26Sep 18, 2023Updated 2 years ago
- Python implementation of the index calculus method for solving discrete logarithm problems☆26Mar 17, 2020Updated 6 years ago
- Multiplying... backward?☆14Jul 22, 2020Updated 5 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks, C99☆24Oct 10, 2019Updated 6 years ago
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The General Sieve Kernel☆148Nov 9, 2025Updated 5 months ago
- A Python based ECDSA secp256k1 private key recovery tool☆33Mar 18, 2024Updated 2 years ago
- Vanitygen plus! Generate vanity address for 80+ cryptocoins including: BTC, LTC, LBRY, UNO, DASH, DOGE, FEATHER, GROESTL, MONA, PEERCOIN,…☆13Feb 7, 2017Updated 9 years ago
- A C++ class that adds arbitrary precision integers aimed at high performance and ease of use. All you need to do is replace int with huge…☆12Mar 6, 2024Updated 2 years ago
- Изучение C++ и алгоритмов CV на спец. курсе для 11 классов ФМЛ №239☆10Sep 5, 2024Updated last year
- The very first serious vulnerability in Blockchain and how to get the public key Bitcoin ECDSA RSZ value from the RawTX file☆20Dec 7, 2022Updated 3 years ago
- ☆34May 20, 2021Updated 4 years ago
- C library for ECC-SM2 public encrypt☆10Dec 17, 2016Updated 9 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- Alzheimer's prediction system deployed on streamlit that employs Logistic Regression to classify whether a person is prone to having Alzh…☆13Dec 5, 2023Updated 2 years ago
- An educational Graph Theory IDE☆26Apr 16, 2026Updated 2 weeks ago
- Bitcoin private key brute force written in Python☆11Aug 22, 2022Updated 3 years ago
- ☆11Nov 6, 2018Updated 7 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Some stuff for CTF.☆10Oct 27, 2019Updated 6 years ago
- Brute force Bitcoin Public keys for puzzles.☆12Dec 24, 2021Updated 4 years ago
- Bloom filter implementation☆46Mar 30, 2026Updated last month
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A beginner's guide to computer programming (2006)☆12Aug 10, 2018Updated 7 years ago
- PoC implementation of Gallois Field, Paillier, DSA, ECDSA, and curve secp256k1 with an adapted scheme of "Two-party generation of DSA si…☆13Feb 5, 2018Updated 8 years ago
- Lattice ECDSA attack☆143Jan 26, 2022Updated 4 years ago
- Basic Arithmetic or Advanced Cryptographic Protocols, SECP256k2 Provides the Essential Functions Needed for Modern Cryptography Generatin…☆10Jul 30, 2024Updated last year
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks☆61Oct 4, 2019Updated 6 years ago
- Library to show secp256k1 curve's mirror called "secq"☆14Aug 6, 2018Updated 7 years ago
- ☆21Jul 31, 2019Updated 6 years ago