Caustic v0.1.11 Caustic.Secp256k1 View Source

Convenience functions for the elliptic curve secp256k1 used in Bitcoin.

Link to this section Summary

Functions

a()

The constant a in the elliptic curve equation y^2 = x^3 + ax + b

b()

The constant b in the elliptic curve equation y^2 = x^3 + ax + b

g()

The generator point G used in public key calculation P = eG

The x component of the generator point G

The y component of the generator point G

n()

The number of possible private keys, because when you consider private keys e >= n it will just loop to the same public keys

p()

The order of the finite field used in secp256k1

Verifies whether a given ECDSA signature is correct

Link to this section Functions

The constant a in the elliptic curve equation y^2 = x^3 + ax + b

The constant b in the elliptic curve equation y^2 = x^3 + ax + b

The generator point G used in public key calculation P = eG

The x component of the generator point G.

The y component of the generator point G.

The number of possible private keys, because when you consider private keys e >= n it will just loop to the same public keys.

The order of the finite field used in secp256k1.

Verifies whether a given ECDSA signature is correct.