Pieter Wuille
Pieter Wuille
I have a very slight preference for this approach compared to the less-than-64-bytes approach, but really am fine with either. My reasoning is that it's just closer to what we...
@jamesob Rebase?
@jmecom Sorry for the slight tangent here, but: > On our chip, ECDSA takes ~60ms and Schnorr takes ~55ms. We can't use large precomputation tables due to limited RAM. Since...
@jmecom By "window size", you mean the `ECMULT_WINDOW_SIZE` setting? That should have no impact on key generation/signing speed, only on verification speed.
@paplorinc > when compiling with GCC with -O1 I don't think we care about performance/binary properties when compiling with anything below -O2.
I wanted to verify if all invocations of `HelpExampleRpc` produce valid JSON, so I tested by adding a `UniValue::read` inside the function. The following RPCs all fail it still (with...
@vasild That assumes the attacker has sufficient monitoring infrastructure in place to maintain an accurate list of Bitcoin P2P ip:ports. That's obviously not impossible, but it is a significantly larger...
Concept ACK. I think deployment of v2-capable nodes is sufficient that it's reasonable to offer an outbound-v2-only option.
I think the approach here might have an unacceptable performance impact, as it is allocating and deallocating a secure area for every individual key being encrypted/decrypted. It may be better...