Packages: 2530, Size: 10.02 GB

Package details for Python ECDSA 0.13 for Intel x86-64

This package is not recomended, because it's obsolete. Use it on YOUR OWN RISK!!!

This package is for Slackware version, which reached end of life on 2024-01-03. This means that security patches will no longer be provided for it. If you are still using Slackware 14.1 we strongly recommend upgrading to a newer version (preferably as recent as possible).

Name: python-ecdsa (Python ECDSA)
Version: 0.13
Architecture: Intel x86-64
Build: 1
Format: Slackware 14.1

Homepagehttps://github.com/warner/python-ecdsa ext^
Release date: 2015-02-07

This is an easy-to-use implementation of ECDSA cryptography (Elliptic Curve Digital Signature Algorithm), implemented purely in Python, released under the MIT license. With this library, you can quickly create keypairs (signing key and verifying key), sign messages, and verify the signatures. The keys and signatures are very short, making them easy to handle and incorporate into other protocols.

LicenseMIT License ext^
Category: Python
Series: py (All about Python)
SlackBuild: Yes, included
From binary release: No

Dependencies

Requires:

Package history

Version Build Date/Time Size Details
0.13.2 1 2019-05-05 71.98 KB (73 708 B) View

Other formats

Format Version Build Architecture Date/Time Size Details
Slackware 14.2 0.13.3 1 Intel x86-64 2019-10-07 78.27 KB (80 152 B) View
Slackware 14.2 0.13.3 1 Intel i586 2019-10-07 78.18 KB (80 056 B) View
Slackware 14.2 0.13.2 2 Intel x86-64 2019-05-05 72.22 KB (73 956 B) View
Slackware 14.2 0.13.2 2 Intel i586 2019-05-05 72.22 KB (73 952 B) View
Slackware 14.1 0.13.2 1 Intel i486 2019-05-05 72.1 KB (73 832 B) View
Slackware 14.2 0.13 2 Intel x86-64 2016-07-14 71.29 KB (73 000 B) View
Slackware 14.2 0.13 2 Intel i586 2016-07-14 71.31 KB (73 024 B) View
Slackware 14.1 0.13 1 Intel i486 2015-05-01 71.34 KB (73 048 B) View
Slackware 14.0 0.11 1 Intel x86-64 2015-04-29 70.34 KB (72 032 B) View
Slackware 14.0 0.11 1 Intel i486 2015-04-29 70.31 KB (72 000 B) View