Tag: cryptography

70 What is a compressed Bitcoin key? 2012-03-03T08:25:39.543

58 What does the curve used in Bitcoin, secp256k1, look like? 2014-02-09T16:47:59.710

56 Have any cryptography experts vetted the bitcoin source code? 2011-09-01T15:05:32.950

34 Bitcoin Mining ASICs used for cryptographic application? Rainbow tables? 2013-01-23T11:16:30.123

34 ECDSA: (v, r, s), what is v? 2015-07-01T09:28:27.847

15 Which Bitcoin-powered gambling sites are "provably fair"? 2012-09-28T20:27:41.193

15 What is the origin of insecure 64-bit nonces in signatures in the Bitcoin chain? 2019-01-11T05:23:16.847

13 Can the Bitcoin network be used for cracking? 2013-04-07T21:51:24.477

11 What mathematical property links the Armory chain to the public/private keys? 2012-10-03T20:28:14.240

11 Is there a fallback plan if bitcoin's underlying cryptography is cracked? 2014-11-14T22:00:18.563

10 What exactly is generator G in Bitcoin's elliptical curve algorithm? 2014-08-07T16:50:41.897

10 Byte array to hexadecimal and back again in JavaScript 2017-04-12T03:04:01.503

9 Problems with deterministic ECDSA based on RFC6979 in Bitcoin 2015-02-19T14:14:08.633

8 If SHA256 and/or RIPEMD-160 were broken, would all bitcoin addresses be compromised? 2013-03-26T00:07:14.160

8 How can a bitcoin exchange prove its solvency while maintaining privacy? 2014-03-09T03:57:42.003

8 How to generate a Bitcoin Private Key Checksum 2017-03-08T19:07:37.060

7 What OpenCL video cards (or FPGAs) are best for multiplication? 2012-12-12T12:53:37.593

7 What level of mathematical understanding do I need in order to contribute or to understand the crypto behind bitcoin? 2015-07-21T03:59:08.700

7 Is a bitcoin address collision possible if generating 90 million addresses every 4 hours? 2019-01-19T20:12:31.507

6 Is it possible to forward bitcoins without the private keys? 2011-10-18T02:51:53.757

6 Bitcoin Research 2012-09-05T17:46:29.863

6 Where and how is secp256k1 used within Bitcoin? 2012-09-17T04:32:07.897

6 What standard is used for the ECDSA to verify transactions? 2013-04-10T04:15:53.413

6 Recovering the last few digits of a Litecoin private key 2013-05-06T11:08:09.190

6 Is it possible to use a PGP key as a bitcoin address? 2013-12-06T23:16:56.023

6 Is Electrum Cryptographically Secure? 2014-02-24T11:15:15.253

6 Papers/Books on how bitcoin works from a mathematical perspective? 2014-12-12T21:29:12.307

6 How do you derive the lambda and beta values for endomorphism on the secp256k1 curve? 2015-01-30T15:29:29.333

6 Why is a chain code needed for entropy in HD wallets? 2015-12-01T02:26:58.377

6 Is there a point on the secp256k1 curve for any given X coordinate? 2017-07-03T18:08:40.747

6 BIP32 recommends a 256 bit seed. Why do most Bitcoin wallets only use a 128 bit seed? 2018-03-19T11:48:26.827

5 Does a Vanity Address reduce the randomness / entropy of the private key? Is there cryptographic proof? 2013-01-06T16:29:48.593

5 Address Public Private key verification 2013-04-19T00:16:05.417

5 Is it possible to discover the set of bitcoin addresses from a public key? 2015-06-21T14:48:20.800

5 How to generate Ed25519 public key from private key using libsodium? 2016-01-19T01:26:49.997

5 Bitcoin Blockchain in the Quantum computing era 2016-11-04T20:48:36.243

4 What are the advantages of using Secp256k1? 2013-09-13T19:04:32.080

4 Which cryptocurrencies deviate significantly from Bitcoin? 2014-05-13T05:09:23.853

4 Bitcoin's Cryptographic Integrity 2015-11-06T23:40:13.197

4 Is BIP 32 Technology Cryptographic Curve Agnostic? 2016-08-23T20:43:04.940

4 what is a discrete logarithmic assumption? how does it set-up trustless proofs? 2018-02-23T20:20:13.713

4 Low-s value in bitcoin signature 2019-04-09T13:43:26.443

4 What are the 3 arguments called in function SHA256? 2019-05-31T08:35:59.017

4 Can ECDH peers waste each other's time at will? 2019-09-19T20:57:23.953

4 Are BTC Private Keys evenly distributed in 256bit space? 2019-11-13T16:41:56.217

3 How do we have one-to-one mapping given the key size differences? 2011-11-29T00:50:59.093

3 Can there be Bitcoin-like network that also works as whatever@home? 2013-04-01T13:09:39.633

3 The compressed public key byte header 2013-05-28T20:01:54.897

3 What is the ECC key length for OpenCoin's implementation of Ripple? 2013-09-06T16:46:33.513

3 Step by Step - how does sending 1 bitcoin work? 2013-10-14T10:58:27.970

3 Is there a signature format, or cryptography has *only one* possible S value? 2014-02-11T23:43:57.007

3 What are the weakest cryptographic guarantees in Bitcoin? 2014-03-09T19:03:23.973

3 Are Bitcoin Block Hashes Predictable 2014-04-18T18:07:24.470

3 Anonymous transactions technology for a cryptocoin? 2014-07-21T10:06:11.750

3 How to generate a Litecoin Private key and correspondent Public Address in C# 2015-02-19T00:41:18.393

3 Using a Bitcoin or Litecoin miner for attacking PBKDF2 / SHA-256 2015-09-16T13:31:36.517

3 Understanding signing messages with bitcoinjs-lib 2016-11-30T20:25:50.137

3 Range proof's Confidential Transaction understanding 2017-05-18T07:43:20.827

3 Do all Cryptocurrencies uses same Public key Cryptography algorithm? 2017-07-13T14:24:45.917

3 Verifying that a transaction is in the blockchain 2017-12-14T06:15:50.280

3 Implementing NiPoPoW algorithm 2018-01-16T12:26:00.413

3 ECDSA signature with r value of 31? 2019-02-26T08:54:46.237

3 What is so special about chacha20 stream cipher along with poly1305 for message authentication codes? 2019-02-27T19:54:06.670

3 ECDSA - why not using the cyclic additive group 2019-05-26T14:26:55.803

3 To what extent does asymmetric cryptography secure bitcoin transactions? 2019-07-20T08:25:47.237

3 I need to know about wallets in cryptocurrency, how do exchanges generate deposite address per user? 2019-11-07T11:38:32.303

3 Elliptic Curve Point at Infinity 2020-04-09T16:10:04.100

2 How can I use message signing to prove that I have private keys for many different accounts? 2013-02-01T19:40:09.763

2 How does bitcoin work from a technical computer science cryptography perspective? 2013-04-07T07:19:08.337

2 When will the public key of an address used in the network? 2013-04-09T21:38:48.187

2 Economics of Bitcoin Mining 2013-04-28T11:18:41.927

2 What is the Elliptic Curve algorithm used in Ripple to generate public / private key pairs? 2013-12-14T21:24:10.093

2 Does Amit Sahai's indistinguishability obfuscator enable Autonomous Virtual Corporations or "Agents"? 2014-02-05T16:38:33.073

2 Why is Bitcoin better than other cryptocurrency? 2014-02-13T08:08:09.360

2 ECIES - When is it bad to sign and encrypt using the same keys? 2014-02-18T01:39:52.407

2 Should I use a large random value for i in BIP 32 instead of sequential? 2014-03-12T02:02:29.123

2 What is the algorithm used to sign data within Nxt? 2014-09-18T11:49:16.960

2 HMAC "Bitcoin Seed" for BIP32 2015-04-15T00:42:29.710

2 Electrum 2 validation: how is the HMAC always 01...? 2015-05-22T03:15:38.313

2 Ramifications of creating Electrum 2.x seeds which are not BIP39 2015-06-16T11:52:26.653

2 Is Bitcoin mining chance based? 2016-02-23T05:34:13.503

2 Changing a private key of a public Bitcoin address 2016-06-16T21:53:27.100

2 How does ring signature help in range proofs in confidential transaction? 2016-08-04T04:09:46.977

2 How does lighting network ensure all parties cooperate 2016-10-24T21:48:57.393

2 Given a set of consecutive HD private keys, can you generate the next private key without knowing the master private key? 2017-03-02T13:26:06.153

2 How proof of work prevents double spend 2017-10-26T17:52:28.670

2 Would writing one's own cryptocurrency in a language other than C/C++ be stupid? 2017-12-19T00:20:03.223

2 cryptography book or resource 2018-01-27T10:55:01.237

2 Needed maths for full understanding 2018-02-22T21:02:52.463

2 SECP256K1 Minimum Value for Private Key 2018-03-31T23:32:24.673

2 How can I use messengers for crypto transactions? 2018-08-30T09:14:38.333

2 Bitcoin Core Old Wallet.dat Vulnerability 2018-12-11T21:29:47.833

2 What is the current computing speed of performing an elliptic curve multiplication? 2019-03-20T18:09:24.263

2 How can my private key be revealed if I use the same nonce while generating the signature? 2019-03-26T16:41:39.400

2 How to make a homomorphic preimage/payment hash with current lightning network / Bitcoin implementations? 2019-04-24T10:05:41.373

2 Schnorr Fiat Shamir Transformation 2019-04-29T17:45:39.877

2 Are there valid transactions which are impossible to mine? 2019-07-01T15:24:02.030

2 Positive or negative private key of a bitcoin wallet? 2020-01-29T12:18:24.370

2 Why is Public Key aggregation in MuSig described as a product of the public keys? 2020-12-22T21:18:28.480