Skip to content
#

nonce-reuse

Here are 6 public repositories matching this topic...

Browser-based ECDSA demo on secp256k1 and P-256 — sign/verify, live nonce reuse attack with full private key recovery (the PS3 hack, real math), RFC 6979 deterministic nonces verified against test vectors. The signature algorithm behind TLS, Bitcoin, Ethereum, SSH, and WebAuthn. No backends. No simulated math.

  • Updated Apr 19, 2026
  • TypeScript

Browser-based AES-GCM vs AES-GCM-SIV comparison — live nonce reuse attack showing keystream XOR recovery and GHASH key extraction, synthetic IV construction visualizer, and side-by-side misuse-resistance comparison. RFC 8452. Part of crypto-lab.

  • Updated Apr 9, 2026
  • CSS

Improve this page

Add a description, image, and links to the nonce-reuse topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the nonce-reuse topic, visit your repo's landing page and select "manage topics."

Learn more