Skip to content
#

ecdsa-cryptography

Here are 88 public repositories matching this topic...

In this study, we will look at the DeserializeSignature vulnerability, discovered in 2023, which allows attackers to create invalid signatures that can be accepted as valid by the Bitcoin network.

  • Updated May 27, 2024
  • Jupyter Notebook

Shows in a simple way how the sender and receiver function of Alice and Bob works in encrypted form. The ECDiffieHellman (ec key exchange) and ECDSA (ec digital signing) algorithms are used here. The elliptic curves are always selected randomly so that everything in the temporary area is used. Was slightly adapted in 2024 and updated to DotNet8.

  • Updated Apr 30, 2024
  • C#

Improve this page

Add a description, image, and links to the ecdsa-cryptography topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the ecdsa-cryptography topic, visit your repo's landing page and select "manage topics."

Learn more