Comprehensive guides, API reference, and best practices for Forge EC cryptography library
Get up and running with Forge EC in under 5 minutes
Multiple installation methods and dependency management
Customize Forge EC for your specific use case
ECDSA, EdDSA, and Schnorr signature implementations
Point compression, serialization, and format conversion
Hash-to-curve, HMAC, and cryptographic hash functions
Secure random number generation and entropy sources
Essential security practices and common pitfalls to avoid
Understanding and implementing timing-attack resistant code
How to responsibly report security vulnerabilities