<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 16 Apr 2026 18:47:57 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/ecdsa/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Programming - Implementing a Blockchain using Python and Flask [Dev Blog 4]]]></title><description><![CDATA[[Image 1] Introduction Hey it's a me again drifter1! I was quite busy during these days, but here is the fourth dev blog. The new additions have to do with the elliptic cryptography, which is used for]]></description><link>http://direct.ecency.com/hive-169321/@drifter1/programming-implementing-a-blockchain-using-python-and-flask-dev-blog-4</link><guid isPermaLink="true">http://direct.ecency.com/hive-169321/@drifter1/programming-implementing-a-blockchain-using-python-and-flask-dev-blog-4</guid><category><![CDATA[hive-169321]]></category><dc:creator><![CDATA[drifter1]]></dc:creator><pubDate>Sat, 21 Aug 2021 13:10:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/mXkfdToSwHxyVySZpuLfU8yQ6r3QxqS7YGenoRHRF6Dndy1NVNhsS6Br8nDpgHgTtqkLGNumntqvMS8iciYtjCmBaaiNezVLzc5KC4pke?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[每天进步一点点：(实战)从HIVE/STEEM签名中恢复公钥 / Recover the Public KEY from the signature]]></title><description><![CDATA[之前写过好几篇文章学习私钥、公钥、签名、验证以及从签名中恢复出公钥等等。但是这些都是理论，那么能否应用到实际中来呢？今天就来测试一下从HIVE/STEEM交易签名中恢复出公钥。 (图源 ：pixabay) 大家都知道，STEEM/HIVE上有很多公共账户，比如以前的busy.org、utopian.app、steemauto等等，我们将账户授权给这个账户后，这些账户就可以用我们的用户名发帖/点赞等。]]></description><link>http://direct.ecency.com/hive-105017/@oflyhigh/hive-steem-recover-the-public-key-from-the-signature</link><guid isPermaLink="true">http://direct.ecency.com/hive-105017/@oflyhigh/hive-steem-recover-the-public-key-from-the-signature</guid><category><![CDATA[hive-105017]]></category><dc:creator><![CDATA[oflyhigh]]></dc:creator><pubDate>Wed, 08 Apr 2020 12:39:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/X37EMQ9WSwsKQG7nhCXMsgXxUQHwtJm4rGgDFSP27G8NsdrkxXBF83rn2bStF41C6iaYXcR5QpofdgtWP3Hc4N59mvGrkDWqqpPMp?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[每天进步一点点：从签名恢复公钥]]></title><description><![CDATA[之前学习了私钥、公钥、签名、验证等相关知识，一个有意思的地方是，公钥是可以从签名当中恢复的，是不是很神奇？今天我们就来看一下如何从签名当中恢复公钥。 (图源 ：pixabay) 理论 & 算法 从签名恢复出公钥的说明&算法可以参考《SEC 1: Elliptic Curve Cryptography》一文中的4.1.6 Public Key Recovery Operation小节：]]></description><link>http://direct.ecency.com/hive-105017/@oflyhigh/397bw1</link><guid isPermaLink="true">http://direct.ecency.com/hive-105017/@oflyhigh/397bw1</guid><category><![CDATA[hive-105017]]></category><dc:creator><![CDATA[oflyhigh]]></dc:creator><pubDate>Tue, 07 Apr 2020 08:36:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/X37EMQ9WSwsKQG7nhCXMsgXxUQHwtJm4rGgDFSP27G8NsdrkxXBF83rn2bStF41C6iaYXcR5QpofdgtWP3Hc4N59mvGrkDWqqpPMp?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[每天进步一点点：学习用公钥验证]]></title><description><![CDATA[昨天啃了ecdsa用私钥签名摘要，对这部分多了一些了解（其中我并不清楚签名过程中到底做了什么，这部分更加深奥，不去啃了），今天继续学习如何用公钥验证。 (图源 ：pixabay) 简单的示例 首先最简单的签名与验证代码如下： from ecdsa import SigningKey sk = SigningKey.generate(curve=ecdsa.SECP256k1) vk =]]></description><link>http://direct.ecency.com/hive-105017/@oflyhigh/6yfk5i</link><guid isPermaLink="true">http://direct.ecency.com/hive-105017/@oflyhigh/6yfk5i</guid><category><![CDATA[hive-105017]]></category><dc:creator><![CDATA[oflyhigh]]></dc:creator><pubDate>Fri, 03 Apr 2020 14:08:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHeLuau3m8MumiUXfA7eZTW31v33oUtB9pXeiPTQq4wfEstdFWLehhRiFNAtrogMjSdsncuoJjgAE7BwV8bEJiHGLE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[每天进步一点点：学习用私钥签名]]></title><description><![CDATA[最近打算学习一下私钥/公钥/签名等相关内容，发现这块东西真的很难啃，也许弄懂之后就是一两句话的事情，但是不懂的时候一头雾水不得入门真的很难受。 (图源 ：pixabay) 这两天啃了一点签名相关的内容，以ecdsa为例，简单记录一下。 STEEM/HIVE中的签名流程 首先，签名可以直接对消息签名或者对消息摘要签名，对消息签名的实质是对消息进行摘要，然后再签名。 STEEM/HIVE中的签名大致流程如下：]]></description><link>http://direct.ecency.com/hive-105017/@oflyhigh/fgit8</link><guid isPermaLink="true">http://direct.ecency.com/hive-105017/@oflyhigh/fgit8</guid><category><![CDATA[hive-105017]]></category><dc:creator><![CDATA[oflyhigh]]></dc:creator><pubDate>Thu, 02 Apr 2020 14:24:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/5bEGgqZEHBMdvSSM3YPY82SEa7SJvsvpWtBM6Y7qtxHYyEU63tBBAyipM5ySXkmYW8PVpAZFboYmE4oGWmQiM2gCNKfPCAFY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Private and public keys explained]]></title><description><![CDATA[In this video we look at how a private key is created, how this is then used to derive a public key. From there we go through a simplified example of a dsa digital signing algorithm and talk about how]]></description><link>http://direct.ecency.com/public/@jsecoin/private-and-public-keys-explained</link><guid isPermaLink="true">http://direct.ecency.com/public/@jsecoin/private-and-public-keys-explained</guid><category><![CDATA[public]]></category><dc:creator><![CDATA[jsecoin]]></dc:creator><pubDate>Wed, 05 Feb 2020 11:22:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e6jvhRpAU7R5vFwd68XiALXBEDuvmtSC9Ca?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Calculate public key from ECDSA signature plus α]]></title><description><![CDATA[Calculate public key from ECDSA signature plus α My own public key recovery doesn't work, so that using this, and Since v2 has recoverPubKey, I used around here. When I wrote it like this, I knew it would]]></description><link>http://direct.ecency.com/ecdsa/@tkgcci/calculate-public-key-from-ecdsa-signature-plus-a</link><guid isPermaLink="true">http://direct.ecency.com/ecdsa/@tkgcci/calculate-public-key-from-ecdsa-signature-plus-a</guid><category><![CDATA[ecdsa]]></category><dc:creator><![CDATA[tkgcci]]></dc:creator><pubDate>Sun, 22 Dec 2019 07:32:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/JvFFVmatwWHRfvmtd53nmEJ94xpKydwmbSC5H5svBACH815Rd1QXduYdfGrdNeVgC2fvwmJeGtheNUimeMfDSV9kZEuiuWGAe91Bp1grwUmP1aG6P4GgZAyrThsGPURZRtSwN9RqwC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Blockchain Foundations Part 7: Encryption and Digital Signature]]></title><description><![CDATA[Encryption and digital signature are important foundations of the blockchain concept. This article explains the asymetric encryption and the digital signature used with blockchains. The article is part]]></description><link>http://direct.ecency.com/ecdsa/@thomasoss/blockchain-foundations-part-7-encryption-and-digital-signature</link><guid isPermaLink="true">http://direct.ecency.com/ecdsa/@thomasoss/blockchain-foundations-part-7-encryption-and-digital-signature</guid><category><![CDATA[ecdsa]]></category><dc:creator><![CDATA[thomasoss]]></dc:creator><pubDate>Sat, 07 Dec 2019 07:01:45 GMT</pubDate></item><item><title><![CDATA[Cryptography: ECDSA]]></title><description><![CDATA[Overview "If you can't explain it simply, you don't understand it well enough" - Einstein Elliptic curve cryptography (ECC) and digital signature algorithm (ECDSA) are more complex than RSA or]]></description><link>http://direct.ecency.com/ecdsa/@icostan/cryptography-ecdsa</link><guid isPermaLink="true">http://direct.ecency.com/ecdsa/@icostan/cryptography-ecdsa</guid><category><![CDATA[ecdsa]]></category><dc:creator><![CDATA[icostan]]></dc:creator><pubDate>Sat, 13 Apr 2019 13:09:42 GMT</pubDate></item><item><title><![CDATA[EOS Signature verification with Elixir 😍]]></title><description><![CDATA[EOS Signature Verification and ECDSA Tooling with Elixir Photo by Kelly Sikkema on Unsplash Elixir is one of my favorite programming languages. It's a wonderful backend languages and it really lends itself]]></description><link>http://direct.ecency.com/eosio/@ajose01/4qpcsr-eos-signature-verification-with-elixir</link><guid isPermaLink="true">http://direct.ecency.com/eosio/@ajose01/4qpcsr-eos-signature-verification-with-elixir</guid><category><![CDATA[eosio]]></category><dc:creator><![CDATA[ajose01]]></dc:creator><pubDate>Fri, 12 Apr 2019 07:30:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/LcTxR7u1XKaa3e4T1EBuBP18JezPvjFFo8gNuE9CiKHBn3znvJJVhEVXYAvCGfFgVwynNeToJXH3DnMmE1BfrcR4YJpDZF2PhRNB3CvZebaiHXU5TBFcLu5W1jvkGqFG6KidqPNGu23z9dVDhwpg5G7yg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[EOS Signature verification with Elixir 😍]]></title><description><![CDATA[EOS Signature Verification and ECDSA Tooling with Elixir Photo by Kelly Sikkema on Unsplash Elixir is one of my favorite programming languages. It's a wonderful backend languages and it really lends itself]]></description><link>http://direct.ecency.com/elixir/@ajose01/eos-signature-verification-with-elixir</link><guid isPermaLink="true">http://direct.ecency.com/elixir/@ajose01/eos-signature-verification-with-elixir</guid><category><![CDATA[elixir]]></category><dc:creator><![CDATA[ajose01]]></dc:creator><pubDate>Fri, 12 Apr 2019 06:44:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/LcTxR7u1XKaa3e4T1EBuBP18JezPvjFFo8gNuE9CiKHBn3znvJJVhEVXYAvCGfFgVwynNeToJXH3DnMmE1BfrcR4YJpDZF2PhRNB3CvZebaiHXU5TBFcLu5W1jvkGqFG6KidqPNGu23z9dVDhwpg5G7yg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[以太坊研究系列【签名和验证】]]></title><description><![CDATA[前面研究GUSD的Custodian合约时，需要进行离线签名，以前都是对交易进行签名，没有单独对数据进行签名，这次一起来看看怎么对数据签名和验证。 geth签名验证 personal.sign > a0 "0x54b865714068f5f03574ace39a1f3279c4e83e2c" > personal.sign("My name is Chaim!",]]></description><link>http://direct.ecency.com/ethereum/@chaimyu/2kkt3u</link><guid isPermaLink="true">http://direct.ecency.com/ethereum/@chaimyu/2kkt3u</guid><category><![CDATA[ethereum]]></category><dc:creator><![CDATA[chaimyu]]></dc:creator><pubDate>Thu, 15 Nov 2018 09:31:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSnS2EPx6ooCTvhzdxPcbieUw8Gd26SRA859V6pTnjuxcRPSBXDaM4f2o2YwZi4GvYSUoTvnmt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The hard way - Bitcoin: transactions]]></title><description><![CDATA[The hard way - Bitcoin: Transaction This is Part 2 of 'The hard way - Bitcoin' series and I will start with 'the easy way' section first because even this gets a bit complex, then will continue with the]]></description><link>http://direct.ecency.com/bitcoin/@icostan/the-hard-way-bitcoin-transactions</link><guid isPermaLink="true">http://direct.ecency.com/bitcoin/@icostan/the-hard-way-bitcoin-transactions</guid><category><![CDATA[bitcoin]]></category><dc:creator><![CDATA[icostan]]></dc:creator><pubDate>Sun, 11 Nov 2018 12:40:57 GMT</pubDate></item><item><title><![CDATA[橢圓曲線加密演算法 ECDSA 與 RFC6979 改進提案]]></title><description><![CDATA[橢圓曲線加密演算法 ECDSA 與 RFC6979 改進提案 橢圓曲線加密演算法（Elliptic Curve Digital Signature Algorithm，ECDSA）是比特幣、以太坊區塊鏈所使用的非對稱式金鑰加密技術， 可輕易讓貨幣持有者透過私鑰 Private Key（變數：d_A）對資訊進行簽章（Digital Signature），讓所有人使用 Public Key（變數：d,]]></description><link>http://direct.ecency.com/cryptography/@oneleo/ecdsa-rfc6979</link><guid isPermaLink="true">http://direct.ecency.com/cryptography/@oneleo/ecdsa-rfc6979</guid><category><![CDATA[cryptography]]></category><dc:creator><![CDATA[oneleo]]></dc:creator><pubDate>Sat, 27 Oct 2018 08:57:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPAFsEHKnkoLbXmEmV7MxTp56sRazuhrcUHWSAZ45Fqv5gTzEXWbcCWYm9cW9iRfYqK8spaTNqL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[암호화화폐 기술의 핵심은 블록체인보다 ECDSA에 있습니다.]]></title><description><![CDATA[블록체인은 해쉬함수를 계산 경쟁하는 마이닝이란 것을 통해 새로운블록을 만들때 쓰입니다. 이때 만들어진 해쉬코드가 그 블록의 위조방지를 증명합니다. 경쟁을 통해 마이닝하는것을 POW방식이라하고 무작위 피어 노드에 해쉬생성을 맞기거나 피어노드들끼리 새로운블록의 보상을 가져가는방식을 POS 방식이라고 합니다. 그렇다면 ECDSA란 무엇일까요? ECDSA는 송금할때]]></description><link>http://direct.ecency.com/kr/@donworry8/3vzwqu-ecdsa</link><guid isPermaLink="true">http://direct.ecency.com/kr/@donworry8/3vzwqu-ecdsa</guid><category><![CDATA[kr]]></category><dc:creator><![CDATA[donworry8]]></dc:creator><pubDate>Sun, 06 May 2018 17:25:00 GMT</pubDate></item><item><title><![CDATA[암호화화폐 기술의 핵심은 블록체인보다 ECDSA에 있습니다.]]></title><description><![CDATA[블록체인은 해쉬함수를 계산 경쟁하는 마이닝이란 것을 통해 새로운블록을 만들때 쓰입니다. 이때 만들어진 해쉬코드가 그 블록의 위조방지를 증명합니다. 경쟁을 통해 마이닝하는것을 POW방식이라하고 무작위 피어 노드에 해쉬생성을 맞기거나 피어노드들끼리 새로운블록의 보상을 가져가는방식을 POS 방식이라고 합니다. 그렇다면 ECDSA란 무엇일까요? ECDSA는 송금할때]]></description><link>http://direct.ecency.com/ecdsa/@donworry8/ecdsa</link><guid isPermaLink="true">http://direct.ecency.com/ecdsa/@donworry8/ecdsa</guid><category><![CDATA[ecdsa]]></category><dc:creator><![CDATA[donworry8]]></dc:creator><pubDate>Sun, 06 May 2018 16:58:57 GMT</pubDate></item><item><title><![CDATA[Is Andreas wrong when explaining ECDSA?]]></title><description><![CDATA[In some of Andreas Antonopoulos' talks and lectures, he explains how ECDSA works in Bitcoin. He discusses how addition and multiplication of elliptic curves work. He also states that, since there is no]]></description><link>http://direct.ecency.com/bitcoin/@ecavero/is-andreas-wrong-when-explaining-ecdsa</link><guid isPermaLink="true">http://direct.ecency.com/bitcoin/@ecavero/is-andreas-wrong-when-explaining-ecdsa</guid><category><![CDATA[bitcoin]]></category><dc:creator><![CDATA[ecavero]]></dc:creator><pubDate>Sat, 24 Mar 2018 17:38:42 GMT</pubDate></item><item><title><![CDATA[Getting the ECDSA Z Value from a Bitcoin Single Input Transaction]]></title><description><![CDATA[In this video I demonstrate getting the ECDSA Z value from a bitcoin transaction with only one input. I also show the R and S values. The ECDSA R, S and Z values are used throughout the many layers of]]></description><link>http://direct.ecency.com/bitcoin/@seanwasere/fua4svyc</link><guid isPermaLink="true">http://direct.ecency.com/bitcoin/@seanwasere/fua4svyc</guid><category><![CDATA[bitcoin]]></category><dc:creator><![CDATA[seanwasere]]></dc:creator><pubDate>Wed, 14 Mar 2018 14:56:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBqwzwxM6L1P6uLNceBDDCMDnh9LoLfXug1zyFZ7iiiyub5xMzPvAjcw3TLZUTMC7i6TBECHbNEpumVHGh5?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[用python-ecdsa验证OpenSSL生成的私钥公钥]]></title><description><![CDATA[在之前的文章中，我们学习了用OpenSSL命令行生成Elliptic Curve (EC) algorithms(椭圆曲线算法)私钥、公钥。在文末我们提出计划，将尝试ecdsa来操作OpenSSL生成的公私钥，来验证一下他们生成出来的东西是否本质上是一样的。 这一节我们将着手进行尝试，来解除心里的疑问。 (图源 ：pixabay) 思路 我们知道OpenSSL可以生成公钥私钥，python-ecdsa]]></description><link>http://direct.ecency.com/openssl/@oflyhigh/python-ecdsa-openssl</link><guid isPermaLink="true">http://direct.ecency.com/openssl/@oflyhigh/python-ecdsa-openssl</guid><category><![CDATA[openssl]]></category><dc:creator><![CDATA[oflyhigh]]></dc:creator><pubDate>Mon, 22 Jan 2018 13:06:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYmxcbqEXzjzuPpc6y7pdDpvsixqXXSyccSFXu831pigrQyFa75hpZz7en2G1Le5nYJiTJetQri?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[ecdsa学习笔记 / SigningKey、VerifyingKey以及公钥]]></title><description><![CDATA[在我们上一篇文章对比一下ecdsa与secp256k1-py从私钥生成公钥中，我们介绍了由私钥通过ecdsa以及secp256k1-py生成公钥的代码。 其中ecdsa生成公钥的代码是我从steem-python库中扒出来的，咳咳，一直挺好用的，我也就懒得看它具体是咋做的啦。 (图源 ：pixabay) ecdsa 生成校验Key(VerifyingKey)]]></description><link>http://direct.ecency.com/python/@oflyhigh/ecdsa-signingkey-verifyingkey</link><guid isPermaLink="true">http://direct.ecency.com/python/@oflyhigh/ecdsa-signingkey-verifyingkey</guid><category><![CDATA[python]]></category><dc:creator><![CDATA[oflyhigh]]></dc:creator><pubDate>Tue, 16 Jan 2018 05:59:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYmxcbqEXzjzuPpc6y7pdDpvsixqXXSyccSFXu831pigrQyFa75hpZz7en2G1Le5nYJiTJetQri?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>