Post-quantum custody architecture. Separates key capability from spending authority. Every custody operation requires predicate evaluation before signing is permitted. Fail-closed by design.
-
Updated
Feb 17, 2026
Post-quantum custody architecture. Separates key capability from spending authority. Every custody operation requires predicate evaluation before signing is permitted. Fail-closed by design.
RAMnesia Attack: A Scientific Investigation of WireTap Threats to Bitcoin Infrastructure, Hardware Vulnerabilities (CVE-2025-6202, CVE-2023-39910), and Cryptanalytic Methods for ECDSA Key Recovery
The script exploits a fundamental weakness in ECDSA when the same ephemeral key (k) is used in multiple signatures.
Add a description, image, and links to the ecdsa-vulnerability topic page so that developers can more easily learn about it.
To associate your repository with the ecdsa-vulnerability topic, visit your repo's landing page and select "manage topics."