• Top
    • Documentation
    • Books
    • Recursion-and-induction
    • Boolean-reasoning
    • Debugging
    • Projects
    • Std
    • Proof-automation
    • Macro-libraries
    • ACL2
    • Interfacing-tools
    • Hardware-verification
    • Software-verification
      • Kestrel-books
        • Crypto-hdwallet
        • Error-checking
        • Apt
        • Abnf
        • Fty-extensions
        • Isar
        • Kestrel-utilities
        • Prime-field-constraint-systems
        • Soft
        • Bv
        • Imp-language
        • Event-macros
        • Bitcoin
        • Ethereum
        • Yul
        • Zcash
        • ACL2-programming-language
        • Prime-fields
        • Java
        • C
        • Syntheto
        • Number-theory
        • Cryptography
          • R1cs
          • Interfaces
          • Sha-2
          • Keccak
          • Kdf
          • Mimc
          • Padding
          • Hmac
          • Elliptic-curves
            • Secp256k1-attachment
            • Twisted-edwards
            • Montgomery
            • Edwards-bls12
            • Short-weierstrass-curves
            • Birational-montgomery-twisted-edwards
            • Has-square-root?-satisfies-pfield-squarep
            • Secp256k1
            • Secp256k1-domain-parameters
            • Secp256k1-types
              • Secp256k1-priv-key
              • Secp256k1-pub-key
              • Secp256k1-field
              • Secp256k1-point
              • Secp256k1-point-to-bytes
              • Secp256k1-point-infinityp
              • Secp256k1-point-generator
            • Pfield-squarep
            • Secp256k1-interface
            • Bls12-377-domain-parameters
            • Prime-field-extra-rules
            • Points
          • Attachments
          • Elliptic-curve-digital-signature-algorithm
        • Lists-light
        • File-io-light
        • Json
        • Built-ins
        • Solidity
        • Axe
        • Std-extensions
        • Htclient
        • Typed-lists-light
        • Arithmetic-light
      • X86isa
      • Execloader
      • Axe
    • Testing-utilities
    • Math
  • Elliptic-curves

Secp256k1-types

Types for the secp256k1 elliptic curve.

The secp256k1 elliptic curve is specified in Standards for Efficient Cryptography 1 (SEC 1) and Standards for Efficient Cryptography 2 (SEC 2).

Here we introduce fixtypes for field elements, point, and keys, along with an operation to represent points as byte lists.

Subtopics

Secp256k1-priv-key
Fixtype of secp256k1 private keys.
Secp256k1-pub-key
Fixtype of secp256k1 public keys.
Secp256k1-field
Fixtype of the elements of the secp256k1 field.
Secp256k1-point
Fixtype of points on the secp256k1 curve.
Secp256k1-point-to-bytes
Represent a secp256k1 point in compressed or uncompressed form.
Secp256k1-point-infinityp
Check if a secp256k1 point is the point at infinity \mathcal{O} of the curve.
Secp256k1-point-generator
The generator point G of the group of the secp256k1 curve.