It was the Bitcointalk forum that inspired us to create Bitcointalksearch.org - Bitcointalk is an excellent site that should be the default page for anybody dealing in cryptocurrency, since it is a virtual gold-mine of data. However, our experience and user feedback led us create our site; Bitcointalk's search is slow, and difficult to get the results you need, because you need to log in first to find anything useful - furthermore, there are rate limiters for their search functionality.
The aim of our project is to create a faster website that yields more results and faster without having to create an account and eliminate the need to log in - your personal data, therefore, will never be in jeopardy since we are not asking for any of your data and you don't need to provide them to use our site with all of its capabilities.
We created this website with the sole purpose of users being able to search quickly and efficiently in the field of cryptocurrency so they will have access to the latest and most accurate information and thereby assisting the crypto-community at large.
target = 100
target_2 = 100+1 #= 101
t1= target//3 #= 33.333333333333336
t2= target_2//3 #= 33.666666666666664
r= t1+t2 # = 67
class EllipticCurve:
def __init__(self, p, a, b, g_x, g_y, n):
self.p = p
self.a = a
self.b = b
self.g_x = g_x
self.g_y = g_y
self.n = n
def add_points(self, p1, p2):
# Point addition logic here
pass
def subtract_points(self, p1, p2):
# Point subtraction logic here
pass
def scalar_multiply(self, point, scalar):
# Scalar multiplication logic here
pass
# Replace these values with your desired parameters
N = ...
P = ...
G = (..., ...) # (x-coordinate, y-coordinate)
# Create an instance of the EllipticCurve class with your parameters
curve = EllipticCurve(P, 0, 7, G[0], G[1], N)
# Replace with your target public key and desired number of subtractions
target_public_key = "..."
num = 100
# Example of point subtraction loop
subtract_point = G # Initialize subtract_point with base point G
for t in range(num + 1):
# Perform point subtraction
result = curve.subtract_points(subtract_point, G)
# Convert the result to hexadecimal representation
h = (result[0], result[1])
# Print or store the result as needed
print("Subtraction result for iteration {}: {}".format(t, h))
# Update subtract_point for the next iteration
subtract_point = result
# Note: You need to implement the add_points and subtract_points methods
# with the actual point addition and subtraction logic for your curve.
Pcurve = 2**256 - 2**32 - 2**9 - 2**8 - 2**7 - 2**6 - 2**4 -1 # The proven prime
N=0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141 # Number of points in the field
Acurve = 0; Bcurve = 7 # This defines the curve. y^2 = x^3 + Acurve * x + Bcurve
Gx = 55066263022277343669578718895168534326250603453777594175500187360389116729240
Gy = 32670510020758816978083085130507043184471273380659243275938904335757337482424
def ECsub(point1x,point1y,point2x,point2y):
neg_yq = Pcurve - point2y
return ECadd(point1x,point1y,point2x,neg_yq) # point1-point2
from sympy import mod_inverse
import secp256k1 as ice
pub=ice.pub2upub('Here Compressed Public Key')
N=0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141
k=mod_inverse(2,N)
neg1=ice.point_negation(ice.scalar_multiplication(1))
def ters(Qx,Scalar):
ScalarBin = str(bin(Scalar))[2:]
le=len(ScalarBin)
for i in range (1,le+1):
if ScalarBin[le-i] == "0":
Qx=ice.point_multiplication(k,Qx)
else:
Qx=ice.point_addition(Qx,neg1)
Qx=ice.point_multiplication(k,Qx)
return ice.point_to_cpub(Qx)
for x in range(1,65536):
f= (ters(pub,x))
data= open(“halfpub.txt”,”a”)
data.write(f+”\n”)
data.close()
class EllipticCurve:
def __init__(self, p, a, b, g_x, g_y, n):
self.p = p
self.a = a
self.b = b
self.g_x = g_x
self.g_y = g_y
self.n = n
def add_points(self, p1, p2):
# Point addition logic here
pass
def subtract_points(self, p1, p2):
# Point subtraction logic here
pass
def scalar_multiply(self, point, scalar):
# Scalar multiplication logic here
pass
# Replace these values with your desired parameters
N = ...
P = ...
G = (..., ...) # (x-coordinate, y-coordinate)
# Create an instance of the EllipticCurve class with your parameters
curve = EllipticCurve(P, 0, 7, G[0], G[1], N)
# Replace with your target public key and desired number of subtractions
target_public_key = "..."
num = 100
# Example of point subtraction loop
subtract_point = G # Initialize subtract_point with base point G
for t in range(num + 1):
# Perform point subtraction
result = curve.subtract_points(subtract_point, G)
# Convert the result to hexadecimal representation
h = (result[0], result[1])
# Print or store the result as needed
print("Subtraction result for iteration {}: {}".format(t, h))
# Update subtract_point for the next iteration
subtract_point = result
# Note: You need to implement the add_points and subtract_points methods
# with the actual point addition and subtraction logic for your curve.
from sympy import mod_inverse
import secp256k1 as ice
pub=ice.pub2upub('Here Compressed Public Key')
N=0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141
k=mod_inverse(2,N)
neg1=ice.point_negation(ice.scalar_multiplication(1))
def ters(Qx,Scalar):
ScalarBin = str(bin(Scalar))[2:]
le=len(ScalarBin)
for i in range (1,le+1):
if ScalarBin[le-i] == "0":
Qx=ice.point_multiplication(k,Qx)
else:
Qx=ice.point_addition(Qx,neg1)
Qx=ice.point_multiplication(k,Qx)
return ice.point_to_cpub(Qx)
for x in range(1,65536):
f= (ters(pub,x))
data= open(“halfpub.txt”,”a”)
data.write(f+”\n”)
data.close()
key: 111
found: 00000000000000000000000000000000000000000000000000000004aed21170
Total time: 0 h, 0 m, 2 s
key: 111101
found: 00000000000000000000000000000000000000000000000000000022382facd0
Total time: 0 h, 0 m, 13 s
key: 111
found: 00000000000000000000000000000000000000000000000000000004aed21170
Total time: 0 h, 0 m, 2 s
key: 111101
found: 00000000000000000000000000000000000000000000000000000022382facd0
Total time: 0 h, 0 m, 13 s