If you have issues / suggestions / notes / questions, please open an issue or contact me. Let's create a cool library together.
Analyze the data from the file "RawTX.json". Script breakECDSA.py reconstructs the unsigned message for each to find the Z value. The result is returned as R, S, Z, PUBKEY for each of the inputs ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results
Feedback