Solve discrete logarithm problems by the number field sieve method.
☆19Aug 30, 2017Updated 8 years ago
Alternatives and similar repositories for dlog-nfs
Users that are interested in dlog-nfs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Solve discrete logarithm problems by the index calculus method.☆16Aug 30, 2017Updated 8 years ago
- Implementation of the parallel Pollard's rho method for solving the Elliptic Curve Discrete Logarithm Problem (ECDLP).☆11Mar 14, 2015Updated 11 years ago
- A lookup table for the discrete log in secp265k1☆23Feb 27, 2021Updated 5 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆10Oct 29, 2019Updated 6 years ago
- mount driver for windows via linux ssh(sftp)☆11Apr 4, 2014Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Speed up secp256k1 with endomorphism☆14Dec 7, 2022Updated 3 years ago
- Python implementation of the index calculus method for solving discrete logarithm problems☆26Mar 17, 2020Updated 6 years ago
- Lattice reduction technique☆10Oct 14, 2014Updated 11 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks, C99☆24Oct 10, 2019Updated 6 years ago
- Implementation of the Pollard's Rho Lambda Algorithm for the secp256k1 curve.☆20Apr 5, 2026Updated last week
- ECDSA nonce-reuse attack to recover a private key.☆50Mar 27, 2026Updated 2 weeks ago
- The 2016 Crypto and Privacy Village Blinkybadge☆12Sep 7, 2016Updated 9 years ago
- A Python based ECDSA secp256k1 private key recovery tool☆33Mar 18, 2024Updated 2 years ago
- Brute-force the private key of a Bitcoin address☆54Apr 17, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- A fast and unsafe version of an optimized C library for EC operations on curve secp256k1☆26Sep 18, 2023Updated 2 years ago
- Multiplying... backward?☆14Jul 22, 2020Updated 5 years ago
- 32btc bounty address search on GPU☆19Jan 2, 2024Updated 2 years ago
- A powerful solution for tackling the Elliptic Curve Discrete Logarithm Problem (ECDLP) within the context of secp256k1.☆11Dec 13, 2025Updated 4 months ago
- CADO-NFS is a complete implementation in C/C++ of the Number Field Sieve (NFS) algorithm for factoring integers. For official releases, p…☆32May 10, 2020Updated 5 years ago
- One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins☆31Dec 7, 2022Updated 3 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆33Jun 6, 2022Updated 3 years ago
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Kangaroo with the goal of improving efficiency without losing the success rate.☆17Dec 13, 2024Updated last year
- The General Sieve Kernel☆145Nov 9, 2025Updated 5 months ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks☆60Oct 4, 2019Updated 6 years ago
- A Prime Number Algorithm by E. W. Dijkstra☆16Jan 12, 2021Updated 5 years ago
- Timing Attack on TLS' ECDSA signature☆46Sep 8, 2015Updated 10 years ago
- Lattice ECDSA attack☆142Jan 26, 2022Updated 4 years ago
- Vanitygen plus! Generate vanity address for 80+ cryptocoins including: BTC, LTC, LBRY, UNO, DASH, DOGE, FEATHER, GROESTL, MONA, PEERCOIN,…☆13Feb 7, 2017Updated 9 years ago
- ☆34May 20, 2021Updated 4 years ago
- The very first serious vulnerability in Blockchain and how to get the public key Bitcoin ECDSA RSZ value from the RawTX file☆19Dec 7, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- C library for ECC-SM2 public encrypt☆10Dec 17, 2016Updated 9 years ago
- Bloom filter alternative (C++)☆18Nov 8, 2018Updated 7 years ago
- Use your Sun Microsystems Type 7 Keyboard in Microsoft Windows (Properly, with lettered alt graph mappings and even a supplemental mathem…☆24Nov 7, 2011Updated 14 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- Library for exact linear algebra, a C++ template-library based originally on LinBox intended for F4-like implementations☆18Dec 15, 2012Updated 13 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- Alzheimer's prediction system deployed on streamlit that employs Logistic Regression to classify whether a person is prone to having Alzh…☆13Dec 5, 2023Updated 2 years ago