Caustic v0.1.11 Caustic.Secp256k1 View Source
Convenience functions for the elliptic curve secp256k1 used in Bitcoin.
Link to this section Summary
Functions
The constant a in the elliptic curve equation y^2 = x^3 + ax + b
The constant b in the elliptic curve equation y^2 = x^3 + ax + b
The generator point G used in public key calculation P = eG
The x component of the generator point G
The y component of the generator point G
The number of possible private keys, because when you consider private keys e >= n it will just loop to the same public keys
The order of the finite field used in secp256k1
Verifies whether a given ECDSA signature is correct
Link to this section Functions
The constant a in the elliptic curve equation y^2 = x^3 + ax + b
The constant b in the elliptic curve equation y^2 = x^3 + ax + b
The generator point G used in public key calculation P = eG
The x component of the generator point G.
The y component of the generator point G.
The number of possible private keys, because when you consider private keys e >= n it will just loop to the same public keys.
The order of the finite field used in secp256k1.
Verifies whether a given ECDSA signature is correct.