Binance Square

User-shushi

实盘交易
中频交易者
1.2 年
18 关注
14 粉丝
13 点赞
0 分享
全部内容
投资组合
--
翻译
#traderumour Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
#traderumour Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
查看原文
#hemi $HEMI 直到现在,每个需要密码学原语的比特币改进提案(BIP)都必须重新发明轮子。每个提案都附带了其自定义的 Python 实现的 secp256k1 椭圆曲线和相关算法,每个实现之间微妙地不同。这些不一致性引入了安静的责任,并使得审查 BIP 不必要地复杂。这个问题最近在比特币 Optech 通讯 #348 中被强调,并且至少有一小部分比特币开发社区的开发者早已感受到:应该有一个统一的、可重用的密码学 BIP 参考 secp256k1 代码标准。 上周,Blockstream 的 Jonas Nick 和 Tim Ruffing 以及 Sebastian Falbesoner 在这方面取得了重大进展。作为他们现有 ChillDKG 提案的一部分,团队发布了 secp256k1lab。这是一个新的、有意不安全的 Python 库,用于原型设计、实验和 BIP 规范。它不适合生产使用(因为它不是恒定时间,因此容易受到侧信道攻击),但它填补了一个关键空白:它提供了 secp256k1 功能的干净、一致的参考,包括 BIP-340 风格的 Schnorr 签名、ECDH 和低级字段/组算术。目标很简单:通过避免冗余的、一次性的实现,使未来的 BIP 编写变得更简单和更安全。对于 BIP 作者来说,这意味着:更少的自定义代码,更少的规范问题,以及从原型到提案的更清晰路径。
#hemi $HEMI 直到现在,每个需要密码学原语的比特币改进提案(BIP)都必须重新发明轮子。每个提案都附带了其自定义的 Python 实现的 secp256k1 椭圆曲线和相关算法,每个实现之间微妙地不同。这些不一致性引入了安静的责任,并使得审查 BIP 不必要地复杂。这个问题最近在比特币 Optech 通讯 #348 中被强调,并且至少有一小部分比特币开发社区的开发者早已感受到:应该有一个统一的、可重用的密码学 BIP 参考 secp256k1 代码标准。
上周,Blockstream 的 Jonas Nick 和 Tim Ruffing 以及 Sebastian Falbesoner 在这方面取得了重大进展。作为他们现有 ChillDKG 提案的一部分,团队发布了 secp256k1lab。这是一个新的、有意不安全的 Python 库,用于原型设计、实验和 BIP 规范。它不适合生产使用(因为它不是恒定时间,因此容易受到侧信道攻击),但它填补了一个关键空白:它提供了 secp256k1 功能的干净、一致的参考,包括 BIP-340 风格的 Schnorr 签名、ECDH 和低级字段/组算术。目标很简单:通过避免冗余的、一次性的实现,使未来的 BIP 编写变得更简单和更安全。对于 BIP 作者来说,这意味着:更少的自定义代码,更少的规范问题,以及从原型到提案的更清晰路径。
翻译
#Plume and $PLUME Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
#Plume and $PLUME Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
翻译
$WCT #walletconnect Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
$WCT #walletconnect Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
查看原文
#Dolomite 和 $DOLO 直到现在,所有需要加密原语的比特币改进提案 (BIP) 都必须重新发明轮子。每一个都附带了其自己的自定义 Python 实现的 secp256k1 椭圆曲线及相关算法,彼此之间微妙地不同。这些不一致性引入了安静的责任,使得审查 BIP 不必要地复杂。这个问题最近在比特币 Optech 时事通讯 #348 中得到了强调,这也是至少一些比特币开发社区的开发者们长期以来的感受:应该有一个统一的、可重用的加密 BIP 参考 secp256k1 代码标准。 上周,Blockstream 研究的 Jonas Nick 和 Tim Ruffing 以及 Sebastian Falbesoner 在这方面取得了重大进展。作为他们现有 ChillDKG 提案的一部分,团队发布了 secp256k1lab。一个新的、故意不安全的 Python 库,用于原型设计、实验和 BIP 规范。它不适合生产使用(因为它不是常量时间,因此易受旁路攻击),但它填补了一个关键的空白:为 secp256k1 功能提供了一个干净、一致的参考,包括 BIP-340 风格的 Schnorr 签名、ECDH 和低级字段/组算术。目标很简单:通过避免冗余的、一时的实现,使未来 BIP 的编写更容易、更安全。对于 BIP 作者来说,这意味着:更少的自定义代码,更少的规范问题,以及从原型到提案的更清晰路径。
#Dolomite $DOLO 直到现在,所有需要加密原语的比特币改进提案 (BIP) 都必须重新发明轮子。每一个都附带了其自己的自定义 Python 实现的 secp256k1 椭圆曲线及相关算法,彼此之间微妙地不同。这些不一致性引入了安静的责任,使得审查 BIP 不必要地复杂。这个问题最近在比特币 Optech 时事通讯 #348 中得到了强调,这也是至少一些比特币开发社区的开发者们长期以来的感受:应该有一个统一的、可重用的加密 BIP 参考 secp256k1 代码标准。
上周,Blockstream 研究的 Jonas Nick 和 Tim Ruffing 以及 Sebastian Falbesoner 在这方面取得了重大进展。作为他们现有 ChillDKG 提案的一部分,团队发布了 secp256k1lab。一个新的、故意不安全的 Python 库,用于原型设计、实验和 BIP 规范。它不适合生产使用(因为它不是常量时间,因此易受旁路攻击),但它填补了一个关键的空白:为 secp256k1 功能提供了一个干净、一致的参考,包括 BIP-340 风格的 Schnorr 签名、ECDH 和低级字段/组算术。目标很简单:通过避免冗余的、一时的实现,使未来 BIP 的编写更容易、更安全。对于 BIP 作者来说,这意味着:更少的自定义代码,更少的规范问题,以及从原型到提案的更清晰路径。
查看原文
#BounceBitPrime $BB 直到现在,每一个需要密码学原语的比特币改进提案(BIP)都必须重新发明轮子。每个提案都附带了其自定义的Python实现的secp256k1椭圆曲线及相关算法,每个实现之间都有微妙的不同。这些不一致性引入了潜在的责任,使得审查BIP变得不必要地复杂。这个问题最近在比特币Optech通讯第348期中被强调出来,这也是至少一些比特币开发社区的开发者们长期以来所感受到的:应该有一个统一的、可重用的密码学BIP参考secp256k1代码标准。 上周,Blockstream研究的Jonas Nick和Tim Ruffing以及Sebastian Falbesoner在这方面取得了重大进展。作为他们现有的ChillDKG提案的一部分,团队发布了secp256k1lab。这是一个新的、故意不安全的Python库,用于原型设计、实验和BIP规范。它不适合生产使用(因为它不是常量时间,因此容易受到边信道攻击),但它填补了一个关键的空白:提供了secp256k1功能的干净、一致的参考,包括BIP-340风格的Schnorr签名、ECDH和低级域/群算术。目标很简单:通过避免冗余的单次实现,使编写未来的BIP变得更容易和更安全。对于BIP作者来说,这意味着:更少的自定义代码、更少的规范问题,以及从原型到提案的更清晰路径。
#BounceBitPrime $BB 直到现在,每一个需要密码学原语的比特币改进提案(BIP)都必须重新发明轮子。每个提案都附带了其自定义的Python实现的secp256k1椭圆曲线及相关算法,每个实现之间都有微妙的不同。这些不一致性引入了潜在的责任,使得审查BIP变得不必要地复杂。这个问题最近在比特币Optech通讯第348期中被强调出来,这也是至少一些比特币开发社区的开发者们长期以来所感受到的:应该有一个统一的、可重用的密码学BIP参考secp256k1代码标准。
上周,Blockstream研究的Jonas Nick和Tim Ruffing以及Sebastian Falbesoner在这方面取得了重大进展。作为他们现有的ChillDKG提案的一部分,团队发布了secp256k1lab。这是一个新的、故意不安全的Python库,用于原型设计、实验和BIP规范。它不适合生产使用(因为它不是常量时间,因此容易受到边信道攻击),但它填补了一个关键的空白:提供了secp256k1功能的干净、一致的参考,包括BIP-340风格的Schnorr签名、ECDH和低级域/群算术。目标很简单:通过避免冗余的单次实现,使编写未来的BIP变得更容易和更安全。对于BIP作者来说,这意味着:更少的自定义代码、更少的规范问题,以及从原型到提案的更清晰路径。
翻译
#Mitosis nd $MITO Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
#Mitosis nd $MITO Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
翻译
#Somnia nd $SOMI Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
#Somnia nd $SOMI Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
翻译
#OpenLedger $OPEN Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
#OpenLedger $OPEN Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
翻译
#CryptoIntegration Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
#CryptoIntegration Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
翻译
#BullishIPO Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
#BullishIPO Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
翻译
#MarketTurbulence Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
#MarketTurbulence Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
翻译
#CreatorPad Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
#CreatorPad Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
翻译
#MarketGreedRising Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
#MarketGreedRising Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
查看原文
@Calderaxyz #Caldera 直到现在,每一个需要密码学原语的比特币改进提案(BIP)都不得不重新发明轮子。每个提案都配有自己定制的 Python 实现的 secp256k1 椭圆曲线和相关算法,每个之间都有细微的差别。这些不一致引入了潜在的责任,并使得审查 BIP 不必要地复杂。这个问题最近在比特币 Optech 通讯 #348 中被强调,至少一些比特币开发社区的开发者长期以来感到:应该有一个统一的、可重用的密码学 BIP 参考 secp256k1 代码标准。 上周,Blockstream 的 Jonas Nick 和 Tim Ruffing 以及 Sebastian Falbesoner 在这方面取得了重大进展。作为他们现有的 ChillDKG 提案的一部分,团队发布了 secp256k1lab。这是一个新的、有意不安全的 Python 库,用于原型设计、实验和 BIP 规范。它不适合生产使用(因为它不是恒定时间的,因此容易受到侧信道攻击),但它填补了一个关键的空白:它提供了 secp256k1 功能的干净、一致的参考,包括 BIP-340 风格的 Schnorr 签名、ECDH 和低级域/群算术。目标很简单:通过避免冗余的、一锤子买卖的实现,使未来的 BIP 编写更加容易和安全。对于 BIP 作者来说,这意味着:更少的自定义代码、更少的规范问题,以及从原型到提案的更清晰路径。
@Calderaxyz #Caldera
直到现在,每一个需要密码学原语的比特币改进提案(BIP)都不得不重新发明轮子。每个提案都配有自己定制的 Python 实现的 secp256k1 椭圆曲线和相关算法,每个之间都有细微的差别。这些不一致引入了潜在的责任,并使得审查 BIP 不必要地复杂。这个问题最近在比特币 Optech 通讯 #348 中被强调,至少一些比特币开发社区的开发者长期以来感到:应该有一个统一的、可重用的密码学 BIP 参考 secp256k1 代码标准。
上周,Blockstream 的 Jonas Nick 和 Tim Ruffing 以及 Sebastian Falbesoner 在这方面取得了重大进展。作为他们现有的 ChillDKG 提案的一部分,团队发布了 secp256k1lab。这是一个新的、有意不安全的 Python 库,用于原型设计、实验和 BIP 规范。它不适合生产使用(因为它不是恒定时间的,因此容易受到侧信道攻击),但它填补了一个关键的空白:它提供了 secp256k1 功能的干净、一致的参考,包括 BIP-340 风格的 Schnorr 签名、ECDH 和低级域/群算术。目标很简单:通过避免冗余的、一锤子买卖的实现,使未来的 BIP 编写更加容易和安全。对于 BIP 作者来说,这意味着:更少的自定义代码、更少的规范问题,以及从原型到提案的更清晰路径。
查看原文
@Calderaxyz #Caldera 直到现在,每个需要加密原语的比特币改进提案(BIP)都必须重新发明轮子。每一个提案都带有自己定制的secp256k1椭圆曲线及相关算法的Python实现,每个实现之间都有细微的差别。这些不一致性引入了潜在的责任,使得审查BIP变得不必要地复杂。这个问题在比特币Optech通讯第348期中最近被强调出来,至少一些比特币开发社区的开发者长期以来一直认为:应该有一个统一的、可重用的加密BIP参考secp256k1代码标准。上周,Blockstream研究的Jonas Nick和Tim Ruffing以及Sebastian Falbesoner在这方面取得了重大进展。作为他们现有ChillDKG提案的一部分,团队发布了secp256k1lab。这是一个新的、有意不安全的Python库,用于原型设计、实验和BIP规范。它不适合生产使用(因为它不是恒定时间,因此易受到侧信道攻击),但填补了一个关键空白:它提供了secp256k1功能的干净、一致的参考,包括BIP-340风格的Schnorr签名、ECDH和低级域/群算术。目标很简单:通过避免冗余的、一次性的实现,使得编写未来的BIP更简单、更安全。对于BIP作者来说,这意味着:更少的自定义代码,较少的规范问题,以及从原型到提案的更清晰路径。
@Calderaxyz #Caldera 直到现在,每个需要加密原语的比特币改进提案(BIP)都必须重新发明轮子。每一个提案都带有自己定制的secp256k1椭圆曲线及相关算法的Python实现,每个实现之间都有细微的差别。这些不一致性引入了潜在的责任,使得审查BIP变得不必要地复杂。这个问题在比特币Optech通讯第348期中最近被强调出来,至少一些比特币开发社区的开发者长期以来一直认为:应该有一个统一的、可重用的加密BIP参考secp256k1代码标准。上周,Blockstream研究的Jonas Nick和Tim Ruffing以及Sebastian Falbesoner在这方面取得了重大进展。作为他们现有ChillDKG提案的一部分,团队发布了secp256k1lab。这是一个新的、有意不安全的Python库,用于原型设计、实验和BIP规范。它不适合生产使用(因为它不是恒定时间,因此易受到侧信道攻击),但填补了一个关键空白:它提供了secp256k1功能的干净、一致的参考,包括BIP-340风格的Schnorr签名、ECDH和低级域/群算术。目标很简单:通过避免冗余的、一次性的实现,使得编写未来的BIP更简单、更安全。对于BIP作者来说,这意味着:更少的自定义代码,较少的规范问题,以及从原型到提案的更清晰路径。
翻译
$ENA Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
$ENA Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
翻译
#DeFiGetsGraded Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
#DeFiGetsGraded Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
翻译
#BTCHashratePeak Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
#BTCHashratePeak Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
翻译
$TREE Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
$TREE Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
登录解锁更多内容
浏览最新的加密货币新闻
⚡️ 参与加密货币领域的最新讨论
💬 与喜爱的创作者互动
👍 查看感兴趣的内容
邮箱/手机号码

实时新闻

--
查看更多

热门文章

喜欢唐三
查看更多
网站地图
Cookie偏好设置
平台条款和条件