Elliptic curve tools, ECDSA, and ECDSA attacks.
☆40Aug 14, 2024Updated last year
Alternatives and similar repositories for mini_ecdsa
Users that are interested in mini_ecdsa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks☆61Oct 4, 2019Updated 6 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆10Oct 29, 2019Updated 6 years ago
- Tool for computing elliptic curve (EC) discrete logarithms☆37Jul 8, 2017Updated 8 years ago
- ECDSA encryption☆31Sep 16, 2014Updated 11 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks, C99☆24Oct 10, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Related address generator.☆30May 1, 2015Updated 11 years ago
- Ruby script for cracking ECDSA private key☆10Mar 25, 2017Updated 9 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- very fast (NOT SECURE) implementation of arithmetic on curve secp256k1 on x86_64☆24Jun 29, 2020Updated 5 years ago
- Algorithms to re-compute a private key, to fake signatures and some other funny things with Bitcoin.☆110Apr 6, 2026Updated 3 weeks ago
- Pure Python implementation of an elliptic curve cryptosystem based on FIPS 186-3. WARNING: This Project is de-facto unmaintained since 20…☆20Nov 20, 2015Updated 10 years ago
- Lattice ECDSA attack☆143Jan 26, 2022Updated 4 years ago
- A fast and unsafe version of an optimized C library for EC operations on curve secp256k1☆26Sep 18, 2023Updated 2 years ago
- A brute-force decoder of BIP38 encoded private keys for the CLI.☆15Nov 25, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Find PrivateKey of corresponding Pubkey(s) using BSGS algo☆143Apr 25, 2022Updated 4 years ago
- Elliptic Curve Cryptography playground/toolkit written in pure Python☆70Dec 5, 2022Updated 3 years ago
- Bitcoin & altcoins chainstate (old & new formats) parser☆93Nov 16, 2021Updated 4 years ago
- POSTECH: Heterogeneous Parallel Computing (Fall 2023)☆19Dec 9, 2023Updated 2 years ago
- A small tool to bruteforce weak ethereum private keys and more☆11Jan 9, 2019Updated 7 years ago
- Parallel cryptanalysis☆35May 27, 2022Updated 3 years ago
- an optimized ecdsa private key finding tool☆57Jan 2, 2026Updated 4 months ago
- Breaking ECDSA (not so broken) with LLL☆92Mar 26, 2026Updated last month
- dump private key from btc wallet dat file☆15Jan 29, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Recover keys from corrupt wallet.dat files☆53Oct 29, 2022Updated 3 years ago
- Baby Step Giant Step for SECPK1☆74Apr 20, 2020Updated 6 years ago
- Shor's algorithm simulation using CUDA☆19Nov 10, 2019Updated 6 years ago
- Bruteforce to calculate private key over public key.☆15Nov 16, 2022Updated 3 years ago
- Arabic Font for Common Phrases - AFCP☆10Nov 21, 2015Updated 10 years ago
- Python library for fast elliptic curve crypto☆288Apr 3, 2026Updated 3 weeks ago
- ☆10Mar 19, 2021Updated 5 years ago
- pollard's p-1 algorithm on CUDA☆28Feb 4, 2014Updated 12 years ago
- Node C++ bindings for Bitcoin Core/Berkeley DB 4.8 wallet.dat☆15Nov 28, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Benchmarking Bloom, Cuckoo, Morton, and PD based filter.☆15Mar 19, 2022Updated 4 years ago
- VanBitCracken Spread☆14Apr 3, 2021Updated 5 years ago
- Implementation of the Tonelli-Shanks algorithm for computing square roots modulo a prime number.☆12Oct 9, 2022Updated 3 years ago
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆45Nov 19, 2025Updated 5 months ago
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆20Feb 3, 2022Updated 4 years ago
- rnn/lstm to generate private keys from public keys of known high value☆38Jan 7, 2022Updated 4 years ago
- Bitcoin, Altcoins and Ethereum address collision mining software for cracking private keys☆38Sep 12, 2022Updated 3 years ago