-
We'd love to split the ECDSA signing operation into two steps:
- an "offline" step that is independent on the message,
- an "online" step that depends on the message.
The advantage here is that t…
-
I would like to sign again a transaction that is already confirmed on the blockchain, in order to verify whether a deterministic nonce was used during the original signing process. To achieve this, I …
-
### Botan 3.5.0
In this release pcurves is really just used for hash to curve
* [x] Initial pcurves (point arithmetic, fixed curve params) - that's #3979
* [x] Deprecate all the functionality tha…
-
Instead of 64, a new parameter, t, has been introduced ≥64
Section A.3.1
-
Currently i am only able to use ecdsa keys, which isn’t optimal, as apparently [one leaked byte from the nonce results in breaking the encryption](https://eprint.iacr.org/2020/615)
-
This is the only place where the `ecdsa` library is used:
https://github.com/TimothyClaeys/pycose/blob/5a08c024fefd7656db7c476f868e1ac82bf44459/pycose/algorithms.py#L19-L21
https://github.com/Timo…
-
crypto/ecdsa currently generates "hedged" signatures, by drawing the random nonce from an AES-CTR CSPRNG keyed by `SHA2-512(priv.D || entropy || hash)[:32]`. This is great, as it provides the best of …
-
Preamble:
- I do not use this project, but it came up in a conversation and I looked through the LibCrypto library out of intellectual curiosity.
- My understanding of anything outside the scope at …
-
> pkg info secp256k1-0.1.20171222
> secp256k1-0.1.20171222
> Name : secp256k1
> Version : 0.1.20171222
> Installed on : Tue Sep 18 03:26:40 2018 CST
> Origin : math/sec…
-
`BIP32Node.verify()` allows longer signatures than it should.
This is the sort of thing that isn't immediately exploitable but could be chained with other exploits to shim in unexpected data in pla…
kousu updated
5 years ago