Home

Awesome

nistp256-cairo

A cairo implementation of NIST P-256(AKA Secp256R1).

We use canonical ECC way to make this implementation.

implementation notes

Outsourcing computing

We use python to compute the complex field computing, and verify the correctness in cairo. Start from src/p256_example.cairo.

ECDSA-Verify in Projective coordinates

For a signature , pubkey , base point and msg hash , we have to verify that: and if or

In this form, we avoid division method.