Releases: bitcoin-core/secp256k1
libsecp256k1 v0.7.0
This release is primarily a maintenance release. Besides many minor internal fixes and improvements, a handful of changes affect the public API and thus break API and ABI compatibility. The most notable changes are:
- The pointers
secp256k1_context_static
andsecp256k1_context_no_precomp
to the constant context objects are nowconst
. - Removed previously deprecated function aliases
secp256k1_ec_privkey_<operation>
in favor ofsecp256k1_ec_seckey_<operation>
. - Starting with this release, building with CMake is no longer considered experimental. Traditional GNU Autotools builds (
./configure
andmake
) remain fully supported.
For a more detailed list of changes, see the CHANGELOG.md.
libsecp256k1 v0.6.0
This release adds a musig
module, adds a significantly more robust method to clear secrets from the stack, and removes the unused secp256k1_scratch_space
functions.
For a more detailed list of changes, see the CHANGELOG.md.
libsecp256k1 v0.5.1
This release increases the default signing table size from 22 KiB to 86 Kib, and adds example code for ElligatorSwift-based key exchange.
For a more detailed list of changes, see the CHANGELOG.md.
libsecp256k1 v0.5.0
This release includes algorithmic improvements which increase the speed of key generation and signing. At the same time, the binary size has been reduced significantly, which we expect to benefit embedded users in particular. Moreover, a new function to sort public keys has been added.
For a more detailed list of changes, see the CHANGELOG.md.
libsecp256k1 0.4.1
This release slightly increases the speed of the ECDH operation and significantly enhances the performance of many library functions when using the default configuration on x86_64.
For a list of changes, see the CHANGELOG.md.
libsecp256k1 0.4.0
This release adds a new ellswift
module that implements ElligatorSwift encoding for public keys and x-only Diffie-Hellman key exchange for them.
For a list of changes, see the CHANGELOG.md.
libsecp256k1 0.3.2
This release fixes a "constant-timeness" issue in the ECDH implementation with GCC >=13 that could leave applications using libsecp256k1 vulnerable to a timing side-channel attack. We strongly recommend any users of the library to upgrade if their code may end up being compiled with an affected version of GCC.
For a list of changes, see the CHANGELOG.md.
libsecp256k1 0.3.1
This release fixes a "constant-timeness" issue with Clang >=14 that could leave applications using libsecp256k1 vulnerable to a timing side-channel attack. We strongly recommend any users of the library to upgrade if their code may end up being compiled with an affected version of Clang.
For a list of changes, see the CHANGELOG.md.
libsecp256k1 0.3.0
For a list of changes, see the CHANGELOG.md.
libsecp256k1 0.2.0
For a list of changes see the CHANGELOG.md.