for compressed public keys
import secp256k1 as ice
target_public_key = "032f3342152eff6aca5e7314db6d3301a28d6a90ddcfd189f96babadc2a053d392"
target = ice.pub2upub(target_public_key)
num = 100 # number of times.
sustract= 1 #amount to subtract each time.
sustract_pub= ice.scalar_multiplication(sustract)
res= ice.point_loop_subtraction(num, target, sustract_pub)
for t in range (num+1):
h= (res[t*65:t*65+65]).hex()
hc= ice.to_cpub(h)
data = open("data-base.txt","a")
data.write(str(hc)+"\n")
data.close()
Thank you so much for teaching us new things.👍
Ps, I have learned that we could use inverse keys to do multiplication on a script which only divides, lol.
What are you guys using here, I see a lot of different script some Python some C++ got confused!
are you guys collecting private keys with one script and checking them on another script?
Also there's no puzzle to think about! just a random guess in a range of private keys? right?