Pollard-Rho-kangaroo solved cuda
☆14Oct 9, 2019Updated 6 years ago
Alternatives and similar repositories for Pollard-Rho-kangaroo
Users that are interested in Pollard-Rho-kangaroo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks☆60Oct 4, 2019Updated 6 years ago
- Bitcoin puzzle 64: Private keys are generated randomly in keyspace 8000000000000000:ffffffffffffffff and checks their balance in real-tim…☆17Apr 30, 2021Updated 4 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks, C99☆24Oct 10, 2019Updated 6 years ago
- Kangaroo cuda solver for SECP256K1☆29Oct 30, 2025Updated 5 months ago
- ECDSA nonce-reuse attack to recover a private key.☆50Mar 27, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Python based ECDSA secp256k1 private key recovery tool☆33Mar 18, 2024Updated 2 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆10Oct 29, 2019Updated 6 years ago
- Implement Frey-Rück Attack to get the secret key “K” (NONCE) / Critical vulnerability in the Bitcoin☆13Dec 7, 2022Updated 3 years ago
- Implementation of the parallel Pollard's rho method for solving the Elliptic Curve Discrete Logarithm Problem (ECDLP).☆11Mar 14, 2015Updated 11 years ago
- Pollard’s Kangaroo find solutions to the discrete logarithm secp256k1 PRIVATE KEY + NONCES in a known range☆36Dec 7, 2022Updated 3 years ago
- Bruteforce to calculate private key over public key.☆14Nov 16, 2022Updated 3 years ago
- Tools for btc hacking☆14Feb 21, 2021Updated 5 years ago
- Pollard's kangaroo for SECPK1☆351May 19, 2024Updated last year
- A Python script to help solve the 0.2 BTC Puzzle by testing custom identified seed words against a target address☆13Aug 26, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Find PrivateKey of corresponding Pubkey(s) using Pollard Kangaroo algo☆78Jul 3, 2022Updated 3 years ago
- 32btc bounty address search on GPU☆19Jan 2, 2024Updated 2 years ago
- python script to scan BTC blockchain for input scripts with reused r values☆27Mar 26, 2023Updated 3 years ago
- Keyhunt Windows Version☆30Apr 26, 2024Updated last year
- ☆20Apr 3, 2021Updated 5 years ago
- Find PrivateKey of corresponding Pubkey(s) using BSGS algo☆142Apr 25, 2022Updated 3 years ago
- Algorithms to re-compute a private key, to fake signatures and some other funny things with Bitcoin.☆110Updated this week
- Pollard's kangaroo for SECPK1☆35Jun 22, 2024Updated last year
- Bitcoin Puzzle Transaction Scanner / .NET Core☆26Apr 7, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆77Aug 13, 2023Updated 2 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Nov 28, 2022Updated 3 years ago
- elliptic curve cryptography with GPU acceleration☆31Mar 5, 2023Updated 3 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆33Jun 6, 2022Updated 3 years ago
- Multi Crypto Generator Best Application GUI For Genereted Private Key and Address Wallet Any Coin's : BTC(P2PKH , P2SH, P2WPKH, P2WSH) , …☆21Nov 10, 2022Updated 3 years ago
- This 🐍Python🐍 project uses `PyQt6` to create a GUI that reads and analyzes Bitcoin wallet files, providing insights into encrypted keys…☆10Jun 2, 2025Updated 10 months ago
- Small Python library that allows you to get Bitcoin WIF (wallet import format) from ECDSA private key and vice versa☆27Oct 13, 2017Updated 8 years ago
- A high performance bitcoin address finder.☆237Apr 2, 2026Updated last week
- Get valid bip39 seeds from incomplete seed (brute force)☆11Jul 18, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆34May 20, 2021Updated 4 years ago
- Lattice ECDSA attack☆142Jan 26, 2022Updated 4 years ago
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, …☆27Oct 7, 2021Updated 4 years ago
- Implementation of random search for btc-finder v0.4☆13Jun 24, 2024Updated last year
- Multiplying... backward?☆14Jul 22, 2020Updated 5 years ago
- Retrieve ECDSA signature R,S,Z values from blockchain rawtx or txid.☆127Feb 4, 2025Updated last year
- Generate the address of many coins from the given private key☆27Apr 16, 2022Updated 3 years ago