secp256k1 icon indicating copy to clipboard operation
secp256k1 copied to clipboard

Optimized C library for EC operations on curve secp256k1

Results 171 secp256k1 issues
Sort by recently updated
recently updated
newest added

(Not for immediate merge) In #452 I noted that sqr and mul take about the same time in my config (OSX, 64-bit, no-asm, -O3 -march=native), so this is a quick...

performance

This week I noticed that the includes in this project are a mess. Actually, each file should be self-contained, i.e., include the stuff that it needs (and ideally only the...

The current unit tests are all built against the library's internal source code directly. That means they have the advantage of being to test internal functions that aren't exposed from...

assurance

This is re-base and refactoring of #589 on top of current master with the released Schnorr signature implementation. Still a WIP. Opening PR to make sure I am on the...

I `tests.c` line 5092 you state that tweaking with zero returns 1 (success) and leaves the seckey unchanged - this is what really happens ``` /* Tweak of zero leaves...

Currently BIP341 recommends: > If the spending conditions do not require a script path, the output key should commit to an unspendable script path instead of having no script path....

Hey, how are the works? I have doubts about the project, first you have a doc to guide how to instantiate this API. I'm newbi in c/c++ programming, attending some...

This swaps out the 5x52 field with a 5x64 one, including both inline and external x86_64 asm code (by @kn-cs). I'm just opening this to see if it doesn't break...

I claim the check can be removed but I don't want to touch this stable and well-tested code. On the way, we fix grammar in another comment.

[...] right now the ecmult_gen uses a random projection for the initial point (secp256k1_gej_rescale). ([...] the rescale currently only happens on randomize-- but that is already something that should get...