Skip to content

Latest commit

 

History

History
14 lines (9 loc) · 830 Bytes

README.md

File metadata and controls

14 lines (9 loc) · 830 Bytes

nistp256-cairo

A cairo implementation of NIST P-256(AKA Secp256R1).

We use canonical ECC way to make this implementation.

implementation notes

Outsourcing computing

We use python to compute the complex field computing, and verify the correctness in cairo. Start from src/p256_example.cairo.

ECDSA-Verify in Projective coordinates

For a signature , pubkey , base point and msg hash , we have to verify that: and if or

In this form, we avoid division method.