repo
stringlengths 5
67
| sha
stringlengths 40
40
| path
stringlengths 4
234
| url
stringlengths 85
339
| language
stringclasses 6
values | split
stringclasses 3
values | doc
stringlengths 3
51.2k
| sign
stringlengths 5
8.01k
| problem
stringlengths 13
51.2k
| output
stringlengths 0
3.87M
|
---|---|---|---|---|---|---|---|---|---|
mijinc0/ed25519_keccak | 7eb8e2ef1395f104429a7ad6285c33d401744900 | lib/ed25519_keccak/ed25519base.rb | https://github.com/mijinc0/ed25519_keccak/blob/7eb8e2ef1395f104429a7ad6285c33d401744900/lib/ed25519_keccak/ed25519base.rb#L206-L219 | ruby | test | # decompress point that is compressed into 32bytes | def point_decompress(s)
# check argument | # decompress point that is compressed into 32bytes
def point_decompress(s)
# check argument | raise ArgumentError , "Invalid input length for decompression" unless s.length.equal? 32
y = int_form_bytes(s)
sign = y >> 255
y &= (1 << 255) - 1
x = recover_x(y, sign)
if x.nil? then
return nil
else
return [x, y, 1, x*y % @@p]
end
end |
mijinc0/ed25519_keccak | 7eb8e2ef1395f104429a7ad6285c33d401744900 | lib/ed25519_keccak/ed25519base.rb | https://github.com/mijinc0/ed25519_keccak/blob/7eb8e2ef1395f104429a7ad6285c33d401744900/lib/ed25519_keccak/ed25519base.rb#L229-L237 | ruby | test | # region key manipulation
# hash512(secret)
# => HASH(512bit)
# => [LH(256bit)] / [RH(256bit)]
# => LH -> (set some bits) -> a
# return ( a , RH ) | def secret_expand(secret) | # region key manipulation
# hash512(secret)
# => HASH(512bit)
# => [LH(256bit)] / [RH(256bit)]
# => LH -> (set some bits) -> a
# return ( a , RH )
def secret_expand(secret) | raise "Bad size of private key" unless secret.length.equal? 32
h = hash512(secret)
a = int_form_bytes(h[0,32])
a &= (1 << 254) - 8
a |= (1 << 254)
return [a, h[32,32]]
end |
mijinc0/ed25519_keccak | 7eb8e2ef1395f104429a7ad6285c33d401744900 | lib/ed25519_keccak/ed25519base.rb | https://github.com/mijinc0/ed25519_keccak/blob/7eb8e2ef1395f104429a7ad6285c33d401744900/lib/ed25519_keccak/ed25519base.rb#L244-L253 | ruby | test | # region sign and verify
# [ signature format ]
# | compressed data of _R | s | <- concatnate | def p_sign(secret, message) | # region sign and verify
# [ signature format ]
# | compressed data of _R | s | <- concatnate
def p_sign(secret, message) | a, prefix = secret_expand(secret)
_A = point_compress(point_mul(a, @@G))
r = hash512_modq(prefix + message)
_R = point_mul(r, @@G)
_Rs = point_compress(_R)
h = hash512_modq(_Rs + _A + message)
s = (r + h * a) % @@q
return _Rs + int_to_bytes(s,32)
end |
mijinc0/ed25519_keccak | 7eb8e2ef1395f104429a7ad6285c33d401744900 | lib/ed25519_keccak/ed25519base.rb | https://github.com/mijinc0/ed25519_keccak/blob/7eb8e2ef1395f104429a7ad6285c33d401744900/lib/ed25519_keccak/ed25519base.rb#L278-L282 | ruby | test | # public_keyKey = aG
# "a" is generated form a secret | def p_secret_to_public(secret) | # public_keyKey = aG
# "a" is generated form a secret
def p_secret_to_public(secret) | expanded = secret_expand(secret)
a = expanded.first
return point_compress(point_mul(a, @@G))
end |
mjacobus/semistatic | ea750ef2b91028226f4da67b0d74738fbf311dd1 | app/models/semistatic/page.rb | https://github.com/mjacobus/semistatic/blob/ea750ef2b91028226f4da67b0d74738fbf311dd1/app/models/semistatic/page.rb#L14-L16 | ruby | test | # get part by its name
# param
# @return Part | def part(name) | # get part by its name
# param
# @return Part
def part(name) | parts.select {|p| p.name.downcase == name.to_s.downcase }.first
end |
Subsets and Splits