Elliptic curve tools, ECDSA, and ECDSA attacks.
☆41Aug 14, 2024Updated last year
Alternatives and similar repositories for mini_ecdsa
Users that are interested in mini_ecdsa are comparing it to the libraries listed below
Sorting:
- Implementation of the parallel Pollard's rho method for solving the Elliptic Curve Discrete Logarithm Problem (ECDLP).☆11Mar 14, 2015Updated 10 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks☆60Oct 4, 2019Updated 6 years ago
- Tool for computing elliptic curve (EC) discrete logarithms☆37Jul 8, 2017Updated 8 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks, C99☆24Oct 10, 2019Updated 6 years ago
- ECDSA encryption☆30Sep 16, 2014Updated 11 years ago
- Related address generator.☆30May 1, 2015Updated 10 years ago
- Este projeto é fruto de um estudo pessoal sobre o algoritmo Secp256k1. O objetivo dele é conseguir obter, usando apenas os valores da cha…☆12Dec 7, 2022Updated 3 years ago
- Algorithms to re-compute a private key, to fake signatures and some other funny things with Bitcoin.☆110Oct 19, 2020Updated 5 years ago
- Ruby script for cracking ECDSA private key☆10Mar 25, 2017Updated 8 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- dump private key from btc wallet dat file☆14Jan 29, 2022Updated 4 years ago
- POSTECH: Heterogeneous Parallel Computing (Fall 2023)☆19Dec 9, 2023Updated 2 years ago
- Dumps the private keys from a wallet.dat file.☆12Oct 11, 2019Updated 6 years ago
- Parallel cryptanalysis☆35May 27, 2022Updated 3 years ago
- Shor's algorithm simulation using CUDA☆19Nov 10, 2019Updated 6 years ago
- VanBitCracken Spread☆14Apr 3, 2021Updated 4 years ago
- 🔐Introduction to lattice-based attacks in cryptanalysis☆14May 6, 2024Updated last year
- ☆10Mar 19, 2021Updated 4 years ago
- Breaking ECDSA (not so broken) with LLL☆91Nov 4, 2025Updated 3 months ago
- A small tool to bruteforce weak ethereum private keys and more☆11Jan 9, 2019Updated 7 years ago
- Benchmarking Bloom, Cuckoo, Morton, and PD based filter.☆15Mar 19, 2022Updated 3 years ago
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆43Nov 19, 2025Updated 3 months ago
- ☆20Apr 3, 2021Updated 4 years ago
- Bitcoin, Altcoins and Ethereum address collision mining software for cracking private keys☆38Sep 12, 2022Updated 3 years ago
- an optimized ecdsa private key finding tool☆55Jan 2, 2026Updated 2 months ago
- Bip39 mnemonic C++ implementation. Contains java and C bindings.☆20Aug 13, 2023Updated 2 years ago
- Recover keys from corrupt wallet.dat files☆49Oct 29, 2022Updated 3 years ago
- Create vanity ethereum addresses like 0xda66666666c3a809ADA79D93114a3662073cC0 through brute force. Also has the ability to load a dictio…☆22Jan 30, 2023Updated 3 years ago
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆19Feb 3, 2022Updated 4 years ago
- Python library for fast elliptic curve crypto☆288Jan 6, 2026Updated last month
- elliptic curve cryptography with GPU acceleration☆31Mar 5, 2023Updated 2 years ago
- Bitcoin addresses bruteforce tool via GPU OpenCL☆62Jan 25, 2018Updated 8 years ago
- Bitcoin Address Prefix Finder☆557Jan 31, 2024Updated 2 years ago
- Brute-force the private key of a Bitcoin address☆55Apr 17, 2023Updated 2 years ago
- Kangaroo cuda solver for SECP256K1☆29Oct 30, 2025Updated 4 months ago
- Retrieve ECDSA signature R,S,Z values from blockchain rawtx or txid.☆124Feb 4, 2025Updated last year
- Script to print all public keys in the blockchain.☆23Jan 15, 2022Updated 4 years ago
- Interactive examples explaining the details of how bitcoin calculations work.☆30May 25, 2025Updated 9 months ago
- Elliptic curve calculator with the curve: Secp256k1☆31Dec 8, 2024Updated last year