pdinges / python-schoof
Python implementation of Schoof's algorithm for counting the points on elliptic curves over finite fields
☆42Updated 5 years ago
Alternatives and similar repositories for python-schoof:
Users that are interested in python-schoof are comparing it to the libraries listed below
- Elliptic Curve Cryptography playground/toolkit written in pure Python☆67Updated 2 years ago
- visualize operations on the secp256k1 elliptic curve including point addition, multiplication, signing and verifying☆30Updated 9 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆39Updated 7 months ago
- A fast and unsafe version of an optimized C library for EC operations on curve secp256k1☆25Updated last year
- very fast (NOT SECURE) implementation of arithmetic on curve secp256k1 on x86_64☆24Updated 4 years ago
- Solving BDD and uSVP with predicate☆47Updated 8 months ago
- Python library for fast elliptic curve crypto☆272Updated 2 months ago
- Optimized Binary GCD for Modular Inversion☆43Updated 4 years ago
- A lookup table for the discrete log in secp265k1☆21Updated 4 years ago
- The General Sieve Kernel☆108Updated 3 months ago
- a C++ template library for zero knowledge proofs☆49Updated 9 years ago
- A Python interface for https://github.com/fplll/fplll☆131Updated last month
- Tool for generating Elliptic curve domain parameters☆117Updated this week
- Haraka is a secure and efficient short-input hash function.☆55Updated 7 years ago
- A pairing library of elliptic curve☆60Updated last year
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆23Updated last year
- ☆19Updated 6 years ago
- Optimized C library for EC operations on curve secp256k1☆46Updated 11 months ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- ☆36Updated 2 years ago
- Breaking ECDSA (not so broken) with LLL☆81Updated 2 weeks ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆28Updated 2 years ago
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆13Updated 6 months ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆31Updated 7 months ago
- Simulation framework for non-standard mining strategies☆57Updated 3 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆90Updated 5 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆80Updated 2 years ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆28Updated 6 months ago
- KeccakTools is a set of C++ classes that can help analyze the Keccak sponge function family, designed by Guido Bertoni, Joan Daemen, Mich…☆177Updated 6 years ago
- Exploiting ECDSA Failures in the Bitcoin Blockchain☆65Updated 10 years ago