Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
-
Updated
May 27, 2024 - Python
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
In this study, we will look at the DeserializeSignature vulnerability, discovered in 2023, which allows attackers to create invalid signatures that can be accepted as valid by the Bitcoin network.
A Bridging protocol to move tokens from L1 to L2
The silend-shard-snap application for Metamask users
AuthentiDocs is a team collaboration platform that is backed by digital signature. Here one can have a hierarchical but flexible structure of their organization and use modifiable workflows, store files, discuss in forums or send notices etc. Finally, all those features are bolstered with formal interactions being verified using ECDSA signatures.
Shows in a simple way how the sender and receiver function of Alice and Bob works in encrypted form. The ECDiffieHellman (ec key exchange) and ECDSA (ec digital signing) algorithms are used here. The elliptic curves are always selected randomly so that everything in the temporary area is used. Was slightly adapted in 2024 and updated to DotNet8.
A pure solidity implementation of elliptic curve math, parameterised for curve secp256r1 / prime256v1 / p256.
Refresh/Access JWT authentication server with backend + administration frontend supporting HMAC (HS256 HS384 HS512), RSA (RS256 RS384 RS512), ECDSA (ES256 ES384 ES512) and Ed25519 (EdDSA). See also other repos for Javascript, Python and Go client libraries.
zk-ECDSA signatures in circom for the P256 curve for the Nova proof system
A minimum implementation of ECDSA-P256 signature verification with tinycrypt
Bitcoin message signing/verification tool
— WIP: ecsda-node-202402.netlify.app/ — Incorporate Public Key Cryptography so transfers can only be completed with a valid signature. The person sending the transaction should have to verify that they own the private key corresponding to the address that is sending funds
WIP -- notes: Incorporate Public Key Cryptography so transfers can only be completed with a valid signature. The person sending the transaction should have to verify that they own the private key corresponding to the address that is sending funds
Secret independent (constant time) implementation of deterministic ECDSA nonces (RFC 6979).
ERC-20 blockchain bridge's backend for ECDSA-Signature generation
Using Blockchain with ECDSA to make a secure Decentralized Medical Consultation Platform between Doctors and patients
POC: Solidity Gassless payments with Hardhat
NFTLongShortTrade is a P2P platform where traders can speculate on future NFT prices
Blockchain Software based on concurrent distribution
ECDSA signature with sha256 in Golang
Add a description, image, and links to the ecdsa-signature topic page so that developers can more easily learn about it.
To associate your repository with the ecdsa-signature topic, visit your repo's landing page and select "manage topics."