ecdsa VS crypto-numbers

Compare ecdsa vs crypto-numbers and see what are their differences.

ecdsa

ECDSA stuff in Haskell (by singpolyma)

crypto-numbers

DEPRECATED - use cryptonite - Cryptographic number related function and algorithms (by vincenthz)
Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
ecdsa crypto-numbers
- 1
3 5
- -
0.0 0.0
about 10 years ago about 9 years ago
Haskell Haskell
LicenseRef-OtherLicense BSD 3-clause "New" or "Revised" License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

ecdsa

Posts with mentions or reviews of ecdsa. We have used some of these posts to build our list of alternatives and similar projects.

We haven't tracked posts mentioning ecdsa yet.
Tracking mentions began in Dec 2020.

crypto-numbers

Posts with mentions or reviews of crypto-numbers. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-07-12.
  • Rolling your own crypto: Everything you need to build AES from scratch
    5 projects | news.ycombinator.com | 12 Jul 2022
    But you're approaching it from the wrong perspective: the idea isn't to use the crypto you implement yourself, the idea is to gain a better understanding of how the "magic" works. Of course my hand-rolled RSA/AES crypto is breakable, I know that because that's the default assumption.

    It's akin to saying, "you're not allowed to build your own smoke detector because it will be unsafe!". Of course I know that, I want to understand the differences between a photoelectric and ionization smoke detector, how they work in practice, because reading some PDF schematics just doesn't cut it for me.

    I honestly don't understand the line of reasoning of all this crypto gatekeeping.

    Fun fact: while I was doing my crypto deep dive in 2015, my language of choice being Haskell, I found issues in several libraries, specifically around entropy, and even one library with modulo bias [1]. They were acknowledged and addressed. It was a super fun learning exercise, and seeing all these comments how it's supposedly almost illegal to do this misses the point of people exploring and learning in their own ways.

    https://github.com/vincenthz/hs-crypto-numbers/commit/bceb54...

What are some alternatives?

When comparing ecdsa and crypto-numbers you can also consider the following projects:

secp256k1 - Haskell bindings for secp256k1 library

bcrypt - Haskell bindings for bcrypt

ed25519 - Minimal ed25519 Haskell package, binding to the ref10 SUPERCOP implementation.

merkle-tree

elocrypt - Generate easy-to-remember, hard-to-guess passwords

cryptoconditions - Interledger Crypto-Conditions in Haskell

crypto-pubkey - DEPRECATED - use cryptonite - Cryptographic public key related algorithms in haskell (RSA,DSA,DH,ElGamal)

ripple - Implementation of Ripple client protocol in Haskell

spake2 - SPAKE2 key exchange protocol for Haskell