We're building the most rigorous cryptographic security research in the blockchain space. If you think in math before code, you're in the right place.
- New attack vectors on ECDSA, BLS, or ZK implementations
- GPU-optimized algorithms for cryptographic auditing (CUDA/OpenCL)
- Mathematical proofs of vulnerability exploitability
- Protocol-specific analysis of signature schemes and key derivation
- Tooling improvements to WeakDirect, WeakDerived, or RValueScanner
- Elliptic curve arithmetic optimization (secp256k1, BN254, BLS12-381)
- Lattice attacks on biased ECDSA nonces
- Pollard's Kangaroo / BSGS implementations
- ZK proof system soundness analysis
- Cross-chain bridge signature verification
- Fork the repository
- Create a branch for your work (
feature/lattice-attack-nonce-bias) - Include mathematical documentation — we value proofs over code comments
- Add benchmarks if your contribution affects performance
- Submit a PR with a clear description of the mathematical basis
- CUDA code: use PTX inline assembly for critical paths, benchmark before/after
- Python: include test vectors with known answers
- All crypto: cite the paper/specification you're implementing
- Performance claims must include reproducible benchmarks
If your research discovers a live vulnerability:
- DO NOT publish it in this repo
- Report through the protocol's official bug bounty program
- After the disclosure period (90 days), publish the analysis here
- Credit the protocol's security team for their response
- Open an Issue for discussion of new research directions
- Use Discussions for general cryptography questions
- Tag PRs with appropriate labels:
research,tooling,optimization,bounty
All contributors are credited in published research and tool releases. Significant contributions may lead to shared bug bounty rewards (discussed case-by-case).