Author

Topic: Can someone provide 3 examples of r,s,z and nonce data ? (Read 665 times)

newbie
Activity: 9
Merit: 0
Its not like that, there is no place .. its generating many different arrays of data which is not so easy to understand.
Anyhow thanks, and hope maybe someone can give a hint.

Regards


I think iceland2k14 is not in this thread, he might have helped as those scripts are from him

newbie
Activity: 9
Merit: 0
Its not like that, there is no place .. its generating many different arrays of data which is not so easy to understand.
Anyhow thanks, and hope maybe someone can give a hint.

Regards
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second




Hi jacky19790729,

I am not sure which LLL_nonce_leakage.py you mean!
Because the one from iceland2k14 is just generating the values and try to solve them, but how can you inject your values.
As the example you mentioned of puzzle #120 ?

I will be thankful if somebody can give a hint

Regards

posible make MSB LSB  in r known:

k = 0x157cb65b27a820acb0df711e28550521930

new k ,= fffff5d576e7357a4501ddfe92f467d8381e976131536b49b6e4411220885a7


./modmath 0x157cb65b27a820acb0df711e28550521930 -  0x80000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000
Result: fffff5d576e7357a4501ddfe92f467d8381e976131536b49b6e4411220885a71

userland@localhost:~/ecctools$ ./modmath 0x157cb65b27a820acb0df711e28550521930 -  0x70000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000
Result: fffff71ac80a4ecafc61a23ec095db0801dd566131536b49b6e4411220885a71

userland@localhost:~/ecctools$ ./modmath 0x157cb65b27a820acb0df711e28550521930 -  0x80000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000
Result: fffff5d576e7357a4501ddfe92f467d8381e976131536b49b6e4411220885a71

userland@localhost:~/ecctools$ ./modmath 0x157cb65b27a820acb0df711e28550521930 -  0x60000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000
Result: fffff860192d681bb3c1667eee374e37cb9c156131536b49b6e4411220885a71

for bigger k:

./modmath 0x257cb65b27a820acb0df711e2855052193f - 0x60000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000  Result: fffff860192d681bb3c1667eee374f37cb9c156131536b49b6e4411220885a80

userland@localhost:~/ecctools$ ./modmath 0xb32f2f28d07cd0  - 0x60000000000000000000000000000000000000000000000000000000000000000000000000000 000000000000000                     Result: ffff860192d681bb3c1667eee374ce1313273ce6af48a03bc0858dbbf906be11

userland@localhost:~/ecctools$ ./modmath 0xa32f2f28d07cd0  - 0x60000000000000000000000000000000000000000000000000000000000000000000000000000 000000000000000
Result: ffff860192d681bb3c1667eee374ce1313273ce6af48a03bc0758dbbf906be11

Thanks COBRAS , but i am not sure if you are answering my question but honestly i didn't get you point.

My question was simple, according to jacky19790729 we can use LLL_nonce_leakage to solve puzzle#120 (which is already solved) using the 3 set of RSZ .

But were to put the RSZ values in the LLL script?

Regards

open python file and edit r,s,z, data.
newbie
Activity: 9
Merit: 0
Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second




Hi jacky19790729,

I am not sure which LLL_nonce_leakage.py you mean!
Because the one from iceland2k14 is just generating the values and try to solve them, but how can you inject your values.
As the example you mentioned of puzzle #120 ?

I will be thankful if somebody can give a hint

Regards

posible make MSB LSB  in r known:

k = 0x157cb65b27a820acb0df711e28550521930

new k ,= fffff5d576e7357a4501ddfe92f467d8381e976131536b49b6e4411220885a7


./modmath 0x157cb65b27a820acb0df711e28550521930 -  0x80000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000
Result: fffff5d576e7357a4501ddfe92f467d8381e976131536b49b6e4411220885a71

userland@localhost:~/ecctools$ ./modmath 0x157cb65b27a820acb0df711e28550521930 -  0x70000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000
Result: fffff71ac80a4ecafc61a23ec095db0801dd566131536b49b6e4411220885a71

userland@localhost:~/ecctools$ ./modmath 0x157cb65b27a820acb0df711e28550521930 -  0x80000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000
Result: fffff5d576e7357a4501ddfe92f467d8381e976131536b49b6e4411220885a71

userland@localhost:~/ecctools$ ./modmath 0x157cb65b27a820acb0df711e28550521930 -  0x60000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000
Result: fffff860192d681bb3c1667eee374e37cb9c156131536b49b6e4411220885a71

for bigger k:

./modmath 0x257cb65b27a820acb0df711e2855052193f - 0x60000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000  Result: fffff860192d681bb3c1667eee374f37cb9c156131536b49b6e4411220885a80

userland@localhost:~/ecctools$ ./modmath 0xb32f2f28d07cd0  - 0x60000000000000000000000000000000000000000000000000000000000000000000000000000 000000000000000                     Result: ffff860192d681bb3c1667eee374ce1313273ce6af48a03bc0858dbbf906be11

userland@localhost:~/ecctools$ ./modmath 0xa32f2f28d07cd0  - 0x60000000000000000000000000000000000000000000000000000000000000000000000000000 000000000000000
Result: ffff860192d681bb3c1667eee374ce1313273ce6af48a03bc0758dbbf906be11

Thanks COBRAS , but i am not sure if you are answering my question but honestly i didn't get you point.

My question was simple, according to jacky19790729 we can use LLL_nonce_leakage to solve puzzle#120 (which is already solved) using the 3 set of RSZ .

But were to put the RSZ values in the LLL script?

Regards
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second




Hi jacky19790729,

I am not sure which LLL_nonce_leakage.py you mean!
Because the one from iceland2k14 is just generating the values and try to solve them, but how can you inject your values.
As the example you mentioned of puzzle #120 ?

I will be thankful if somebody can give a hint

Regards

posible make MSB LSB  in r known:

k = 0x157cb65b27a820acb0df711e28550521930

new k ,= fffff5d576e7357a4501ddfe92f467d8381e976131536b49b6e4411220885a7


./modmath 0x157cb65b27a820acb0df711e28550521930 -  0x80000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000
Result: fffff5d576e7357a4501ddfe92f467d8381e976131536b49b6e4411220885a71

userland@localhost:~/ecctools$ ./modmath 0x157cb65b27a820acb0df711e28550521930 -  0x70000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000
Result: fffff71ac80a4ecafc61a23ec095db0801dd566131536b49b6e4411220885a71

userland@localhost:~/ecctools$ ./modmath 0x157cb65b27a820acb0df711e28550521930 -  0x80000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000
Result: fffff5d576e7357a4501ddfe92f467d8381e976131536b49b6e4411220885a71

userland@localhost:~/ecctools$ ./modmath 0x157cb65b27a820acb0df711e28550521930 -  0x60000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000
Result: fffff860192d681bb3c1667eee374e37cb9c156131536b49b6e4411220885a71

for bigger k:

./modmath 0x257cb65b27a820acb0df711e2855052193f - 0x60000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000  Result: fffff860192d681bb3c1667eee374f37cb9c156131536b49b6e4411220885a80

userland@localhost:~/ecctools$ ./modmath 0xb32f2f28d07cd0  - 0x60000000000000000000000000000000000000000000000000000000000000000000000000000 000000000000000                     Result: ffff860192d681bb3c1667eee374ce1313273ce6af48a03bc0858dbbf906be11

userland@localhost:~/ecctools$ ./modmath 0xa32f2f28d07cd0  - 0x60000000000000000000000000000000000000000000000000000000000000000000000000000 000000000000000
Result: ffff860192d681bb3c1667eee374ce1313273ce6af48a03bc0758dbbf906be11
newbie
Activity: 9
Merit: 0
Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second




Hi jacky19790729,

I am not sure which LLL_nonce_leakage.py you mean!
Because the one from iceland2k14 is just generating the values and try to solve them, but how can you inject your values.
As the example you mentioned of puzzle #120 ?

I will be thankful if somebody can give a hint

Regards
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second



Thank you !!!! Wink


But, no logic with so big nonce, can you generate rsz with nonce 2**30 or less for ex to ,120 puzz pubkey ?



Oh, your rsz is work in my scrypt


('K(pubkey)', (7629256135660504971600927553074108133507503631055291753784190722374696861083 : 25194535474527288837776266966493444390702606185675650052918194213452675896875 : 1)):

('BP', (114224221225710244008833485319885360327960624386540578738397512880450404677861 : 72429032990058375812461306873221236352211543024398501719746160220160202723318 : 1))
sys:1: DeprecationWarning: use the method .hex instead
See https://trac.sagemath.org/26756 for details.

('BP*i', (94396044595232036512156845067099144740980476962933515336874287249977680693713 : 103748817412717866899495297471464484401437733019173646860487930588615334617081 : 1))
stride', 61982023939864607551350919997648825866663898650636854501024779331813868694167, 'hex r', '890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97', 'r %n:', '890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97')
('start range', 109059656781699855293660303596617595953680596646633396165073266196958837652548)
yes!!!
('Found real k:', 3142775905973132413425035830673719814, 'i', 'i%n', 3142775905973132413425035830673719814, 'hex i%n', '25d46d0bccbc08eafa03912b3f2c206')
('i / stride', 108201930346108686079071460207770997208299616649283473366433152632256227467196)



@cobras can you please provide the link to the code you used to get this ?



Code:

import random

p = 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffc2f
n = 0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141

E = EllipticCurve(GF(p), [0, 7])

G = E.point( (0x79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798,0x483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8))   # Base point

r=0x00fc5e2ab560be4649b85511940daf8302cf2e2e06bfd60a75c8bae5f832da289c
s=0x45c4c9d548699bbc5f3484a2d6d59ac07ea3328a1deb6b2bb9f2f8f0727be1de
z=0x6559f4e4b8d7824a641418b992f913411a1995fa35668c8c634b5a19a93a944c

r= 115780575977492633039504758427830329241728645270042306223540962614150928364886
s= 115784413730767153834193500621449522112098284939719838943229029456606672741370
z= 0#2

#r=0x00fc5e2ab560be4649b85511940daf8302cf2e2e06bfd60a75c8bae5f832da289c
#s=0x45c4c9d548699bbc5f3484a2d6d59ac07ea3328a1deb6b2bb9f2f8f0727be1de
#z=0x6559f4e4b8d7824a641418b992f913411a1995fa35668c8c634b5a19a93a944c

#r = 0x57a463b8ac30f2ed36767d5ccabf04fbe29c94b054b4309996f086556428c748
#s = 0x5a4c7e96159688e8cd2525a3230ec5184597d6cfbaf037ca5815fa01097f67cc
#z = 0xa37f38a2db651ba57f68ef4d0ac297e732d0eb3954bb85ac069569f9b372daa0

#r=91569536891656778098714370566123400538808691962301036137348069575478543413371    
#s=21986343255696161951638838250895082624842596755182648655691313830200114210986
#z=6438777035962518887320975299969341061899935085590046638463194556599680845483



#r = 0x57a463b8ac30f2ed36767d5ccabf04fbe29c94b054b4309996f086556428c748
#s = 0x5a4c7e96159688e8cd2525a3230ec5184597d6cfbaf037ca5815fa01097f67cc
#z = 0xa37f38a2db651ba57f68ef4d0ac297e732d0eb3954bb85ac069569f9b372daa0


#r=91569536891656778098714370566123400538808691962301036137348069575478543413371    
#s=21986343255696161951638838250895082624842596755182648655691313830200114210986
#z=6438777035962518887320975299969341061899935085590046638463194556599680845483
#k1= 5853058856940450056452093598338931896    


#r=61519875576959414226926169384481904657930768090393239472847547225569960244009    
#s=29672653379714264364848115664009668074279832200087452759694676488206965592960    
#z=0#4050084529116149167467364769454239620376951321631508848629310185885835508238
#k2= 7445435163608072498280972003769376603    

 #1 (Good):
#r =17456122099107622875979177060034160065534440309384765110770021588156777535269
#s= 39548918176628970790297874101648966881380966278908886743977542233652364916621
#z=11209404430005450692776394377220775389388011163944676048947869460159787075727
 #K :15903292315272842822984172996837488417
 
#r= 67192827200719728671013143999224641878827088629569520859649981708262221161753
#s= 21608529402161090347089631880934247809827970003164648927506043545200098952651
#z= 112249473659839884270956019532951121635444899419588574642077042903180652398468


#k1: 0x3c977dbdb3deeefcffef9fda93cdfeacfb83a8a9a6439585bb37f052a16f314
#r = 0x2c0a015c8976d170edc918480ee981e75c513dfea11086ddc89baadfd9038a29
#s = 0xf06ac541347ff93f4269579d9ca71cf7ad32859b83596721798b370ec9100749
#z= 0x37c7de2760ab892174e6680d621e72eb60b4b7cde365164ee00fee7f3a3e83dd
 
def egcd(a, b):

    if a == 0:

        return (b, 0, 1)

    else:

        g, y, x = egcd(b % a, a)

        return (g, x - (b // a) * y, y)
def modinv(a, m):

    g, x, y = egcd(a, m)

    if g != 1:

        raise Exception('modular inverse does not exist')

    else:

        return x % m
def make_public(r,s,z):
    R = E.lift_x(Integer(r))
    w = int(modinv(s, n))
    u1 = int((z * w) % n)
    u2 = int((r * w) % n)
    #R=u1*G + u2*public_key
    #pub= R*modinv(u2,n) - u1*modinv(u2,n)%n
    u_n2=modinv(u2,n)%n
    u_n1=- u1*modinv(u2,n)%n
  
    pub=u_n1*G + u_n2*R
    pub2=u_n1*G + u_n2*(-R)
    return pub,pub2

def verify(r, s,z,public_key):
    w = int(modinv(s, n))
    u1 = int((z * w) % n)
    u2 = int((r * w) % n)
    D=u1*G + u2*public_key
    x,y=D.xy()
    x=int(x)

    if (r % n) == (x % n):
        print( "signature matches")
        
    else:
        print("invalid signature")
          
def calc_u(r,s,z):
    mod_s= modinv(s,n)%n
    u1=int(mod_s*z%n)
    u2=int(mod_s*r%n)
    print("u1:",hex(u1) , "n-u1:",hex(n-u1))
    print("u2:",hex(u2) , "n-u2:",hex(n-u2))
    return u1,u2
u1 , u2 = calc_u(r,s,z)

pub1,pub2=make_public(r,s,z)
#print("public_key1",pub1)
#print("pub1_x=",hex(pub1.xy()[0]))
#print("public_key2",pub2)
#print("pub2_x=",hex(pub2.xy()[0]))
verify(r,s,z,pub1)
verify(r,s,z,pub2)
print()

i = 0# 0x3c977dbdb3deeefcffef9fda93cdfeacfb83a8a9a6439585bb37f052a16f314 - 100# 15903292315272842822984172996837488410##+  7445435163608072498280972003769376600  #=z !!!
u_matches = []

while True:#i <= 0x3c977dbdb3deeefcffef9fda93cdfeacfb83a8a9a6439585bb37f052a16f314:
    k = i%n #(z+i )#%n # * modinv(s, n) % n #start range
#    print("k",k)
    R = E.lift_x(Integer(r))
    K  = (k * (  modinv(s, n) * G *r)) - z*G
    Zz = z * (  modinv(s, n) * G)
    K =K + Zz
 #( modinv(s, n) * G) - base point
    u1 = (modinv(s, n) * z) % n
    u2 = (modinv(s, n) * r) % n
    BP = E.point(modinv(s, n) * G *r)
    #if k <=5853058856940450056452093598338931896:print("$$$",k,i)
    if K == E.point( ((u1 * G + u2 * R) -z*G  )): # () - pubkey
        print("&",k)
        print("PUBKEY", (u1 * G + u2 * R) - z *G)
        print("K(pubkey)",K )
        print("BP", BP)
        print("BP x", hex(72742032162118480585933344979617114227426107059606997208268050083726572592328))
        print("BP y", hex( 35252511027654091311316081050016893461309059670017896859124791030125997564641 ) )

        print("BP*i",E.point(  BP * (i %n)  ))

        print("BP * I X", hex(25962615284857788650433366285141778689269351625425698801309571789856719536146) )
        print("BP * I Y", hex( 89356828949915730784371396370143898384661978637077061268606979053842025622546 ) )
        print("stride",r,"hex r",hex(r),"r %n:",hex(r %n))
        print("start range",z)
        print("yes!!!")
        print("Found real k:", k,"i","i%n",i%n,"hex i%n",hex(i%n) )
        print("i / stride", i%n * modinv(r,n)%n )
        #print(modinv(s,n)%z+r)
        #print(modinv(s,n)//z+r)
        break
  
    i =i +  1 %n

i = 0
while True:
    k = (r * i + z) * modinv(s, n) % n
    #print("Invalid nonce K:", hex(k))
    if k == u1:
        print("Match found for u1 at i =", i)
        u_matches.append(("u1", i))
    if k == u2:
        print("Match found for u2 at i =", i)
        u_matches.append(("u2", i))
    if k == (n - u1):
        print("Match found for n - u1 at i =", i)
        u_matches.append(("n - u1", i))
    if k == (n - u2):
        print("Match found for n - u2 at i =", i)
        u_matches.append(("n - u2", i))
    
    if k <=2**100:
        print("!!!",k,i)
        break
    if len(u_matches) >= 1:
        print("Matches found for u values:", u_matches)
        break  # Break the loop if matches for all u values are found
    i += 1


  






with s = 1, work too

r= 115780575977492633039504758427830329241728645270042306223540962614150928364886
s= 1
z= 0#2

Found real k: 6 i i%n 6 hex i%n 0x6
newbie
Activity: 10
Merit: 0
Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second



Thank you !!!! Wink


But, no logic with so big nonce, can you generate rsz with nonce 2**30 or less for ex to ,120 puzz pubkey ?



Oh, your rsz is work in my scrypt


('K(pubkey)', (7629256135660504971600927553074108133507503631055291753784190722374696861083 : 25194535474527288837776266966493444390702606185675650052918194213452675896875 : 1)):

('BP', (114224221225710244008833485319885360327960624386540578738397512880450404677861 : 72429032990058375812461306873221236352211543024398501719746160220160202723318 : 1))
sys:1: DeprecationWarning: use the method .hex instead
See https://trac.sagemath.org/26756 for details.

('BP*i', (94396044595232036512156845067099144740980476962933515336874287249977680693713 : 103748817412717866899495297471464484401437733019173646860487930588615334617081 : 1))
stride', 61982023939864607551350919997648825866663898650636854501024779331813868694167, 'hex r', '890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97', 'r %n:', '890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97')
('start range', 109059656781699855293660303596617595953680596646633396165073266196958837652548)
yes!!!
('Found real k:', 3142775905973132413425035830673719814, 'i', 'i%n', 3142775905973132413425035830673719814, 'hex i%n', '25d46d0bccbc08eafa03912b3f2c206')
('i / stride', 108201930346108686079071460207770997208299616649283473366433152632256227467196)



@cobras can you please provide the link to the code you used to get this ?



Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second


How did you use LLL_nonce_leakage.py to get to privekey?
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
@COBRAS and what the sense to brutforce nonce ?

nonce can be 30 bit for example, like in trust wallet mistake what was published some time ago
jr. member
Activity: 43
Merit: 1
@COBRAS and what the sense to brutforce nonce ?
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second



Thank you !!!! Wink


But, no logic with so big nonce, can you generate rsz with nonce 2**30 or less for ex to ,120 puzz pubkey ?



Oh, your rsz is work in my scrypt


('K(pubkey)', (7629256135660504971600927553074108133507503631055291753784190722374696861083 : 25194535474527288837776266966493444390702606185675650052918194213452675896875 : 1)):

('BP', (114224221225710244008833485319885360327960624386540578738397512880450404677861 : 72429032990058375812461306873221236352211543024398501719746160220160202723318 : 1))
sys:1: DeprecationWarning: use the method .hex instead
See https://trac.sagemath.org/26756 for details.

('BP*i', (94396044595232036512156845067099144740980476962933515336874287249977680693713 : 103748817412717866899495297471464484401437733019173646860487930588615334617081 : 1))
stride', 61982023939864607551350919997648825866663898650636854501024779331813868694167, 'hex r', '890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97', 'r %n:', '890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97')
('start range', 109059656781699855293660303596617595953680596646633396165073266196958837652548)
yes!!!
('Found real k:', 3142775905973132413425035830673719814, 'i', 'i%n', 3142775905973132413425035830673719814, 'hex i%n', '25d46d0bccbc08eafa03912b3f2c206')
('i / stride', 108201930346108686079071460207770997208299616649283473366433152632256227467196)

can you please provide the link to the code you used to get this ?


i was answer you in pm

Hello Cobra,

can you also pm me?

Thanks

Check your pm
newbie
Activity: 1
Merit: 0
Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second



Thank you !!!! Wink


But, no logic with so big nonce, can you generate rsz with nonce 2**30 or less for ex to ,120 puzz pubkey ?



Oh, your rsz is work in my scrypt


('K(pubkey)', (7629256135660504971600927553074108133507503631055291753784190722374696861083 : 25194535474527288837776266966493444390702606185675650052918194213452675896875 : 1)):

('BP', (114224221225710244008833485319885360327960624386540578738397512880450404677861 : 72429032990058375812461306873221236352211543024398501719746160220160202723318 : 1))
sys:1: DeprecationWarning: use the method .hex instead
See https://trac.sagemath.org/26756 for details.

('BP*i', (94396044595232036512156845067099144740980476962933515336874287249977680693713 : 103748817412717866899495297471464484401437733019173646860487930588615334617081 : 1))
stride', 61982023939864607551350919997648825866663898650636854501024779331813868694167, 'hex r', '890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97', 'r %n:', '890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97')
('start range', 109059656781699855293660303596617595953680596646633396165073266196958837652548)
yes!!!
('Found real k:', 3142775905973132413425035830673719814, 'i', 'i%n', 3142775905973132413425035830673719814, 'hex i%n', '25d46d0bccbc08eafa03912b3f2c206')
('i / stride', 108201930346108686079071460207770997208299616649283473366433152632256227467196)

can you please provide the link to the code you used to get this ?


i was answer you in pm

Hello Cobra,

can you also pm me?

Thanks
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Nonce range as I know , from sender me rsz is about  2**100
Try someone find a nonces,  send me pm for vet privkeys from me

Most nonce or k values ​​are greater than 2^250  ~  2^256
Take the 5   r,s,z examples from puzzle #65


secret:  0x000000000000000000000000000000000000000000000001a838b13505b26867
k1 = 0x756C944E21250A11F1E74DCB12497F8ECBEF2AB9B659E37C60F4432C22A25F45
r1 = 0x004F7F2657387CF1FEF8152E2BBD39F153EE235E1F46294FDED0D42DACBBE7EA
z1 = 0x76757E4B29801BBB747A125C0BB6752FEEEABD84C58FE3DD71E94EED3839DFAA
s1 = 0x430773BE7EBDA7FBA5ED2F829E9B47A7F92D526905C250780F044ED860DE0786


secret:  0x000000000000000000000000000000000000000000000001a838b13505b26867
k1 = 0xF4CEE1FA7BA811030D7504DD340CE473C897D3C1C54053DB9A11FC158265EF0D
r1 = 0xC2C70DEFC5E6E3FFCAAD03EB63BE47F0C76D6B60C3EA9506A6A9A89C1BDB4925
z1 = 0x5AE54DC089E0B5227C0B82AB660DDF56E6F239DB992435BFD343943272133E1D
s1 = 0x12F9DD81ECD6286C3B50058CCE533D926D8D3E68A940C80DBD7FCF79B18EAFFB


secret:  0x000000000000000000000000000000000000000000000001a838b13505b26867
k1 = 0x8984A0C8227E8E7B423533303B0FB5796FFF1C7FE55A05A90C1F2B41B45AE167
r1 = 0x375FA4D0979CEEBA073A8E30905B9AA55E60096C9B9513C7D52778446F0BE80C
z1 = 0xC4810C4476AC5411826DD9D5D2FB1F042FCCCFEB68364CACBF619886D0F680CD
s1 = 0x069EBC9C1F3E5AFB0415AE16233EBC8D663F9FEBB428CA6DFC1486F03AD49636


secret:  0x000000000000000000000000000000000000000000000001a838b13505b26867
k1 = 0x52A622856C6415155E61E50D9512DE78643387163BEB555203CEAB9A9733CC0E
r1 = 0x37FDD5382CD43A0E9A26DF5B540BC14A9CB4E41E8B90062E92037CEAC95C1391
z1 = 0x8A665FA3700F0D2284AD073552AECFF63D2C14303E8A696E83FEB77ABA63C4E7
s1 = 0x6C49E5A898D38CCADD7CBCAC924AE54148AF5D9EC2A72E3EA3F26BA7B5806D5D


secret:  0x000000000000000000000000000000000000000000000001a838b13505b26867
k1 = 0x68592D1AA72720AE7333BEB3BD9D6A8E69C0567FB91720318C6289D48227C05D
r1 = 0x5546E2EA6259151CE2BC9040EFD94F8019CC08C5524CA18A77F26DCD74DEB10A
z1 = 0x339207A21F02059DCC8BFC47F62C9EC289F3C3037BDC24C8FEE9174280F182A2
s1 = 0x3E94A32386348F863F6EC148077EB3EBDDFD4C0333C5B2030187F6B8686FE98D





yes, bro, I confirm what this rsz has nonce  k1 what you provide, for ex:


('Found real k:', 110729865195598591003245425351000020289979631040596526144156170000240210210568, 'i', 'i%n', 110729865195598591003245425351000020289979631040596526144156170000240210210568, 'hex i%n', 'f4cee1fa7ba811030d7504dd340ce473c897d3c1c54053db9a11fc158265ef08')


this is for:


secret:  0x000000000000000000000000000000000000000000000001a838b13505b26867
k1 = 0xF4CEE1FA7BA811030D7504DD340CE473C897D3C1C54053DB9A11FC158265EF0D
r1 = 0xC2C70DEFC5E6E3FFCAAD03EB63BE47F0C76D6B60C3EA9506A6A9A89C1BDB4925
z1 = 0x5AE54DC089E0B5227C0B82AB660DDF56E6F239DB992435BFD343943272133E1D
jr. member
Activity: 82
Merit: 8
Nonce range as I know , from sender me rsz is about  2**100
Try someone find a nonces,  send me pm for vet privkeys from me

Most nonce or k values ​​are greater than 2^250  ~  2^256
Take the 5   r,s,z examples from puzzle #65


secret:  0x000000000000000000000000000000000000000000000001a838b13505b26867
k1 = 0x756C944E21250A11F1E74DCB12497F8ECBEF2AB9B659E37C60F4432C22A25F45
r1 = 0x004F7F2657387CF1FEF8152E2BBD39F153EE235E1F46294FDED0D42DACBBE7EA
z1 = 0x76757E4B29801BBB747A125C0BB6752FEEEABD84C58FE3DD71E94EED3839DFAA
s1 = 0x430773BE7EBDA7FBA5ED2F829E9B47A7F92D526905C250780F044ED860DE0786


secret:  0x000000000000000000000000000000000000000000000001a838b13505b26867
k1 = 0xF4CEE1FA7BA811030D7504DD340CE473C897D3C1C54053DB9A11FC158265EF0D
r1 = 0xC2C70DEFC5E6E3FFCAAD03EB63BE47F0C76D6B60C3EA9506A6A9A89C1BDB4925
z1 = 0x5AE54DC089E0B5227C0B82AB660DDF56E6F239DB992435BFD343943272133E1D
s1 = 0x12F9DD81ECD6286C3B50058CCE533D926D8D3E68A940C80DBD7FCF79B18EAFFB


secret:  0x000000000000000000000000000000000000000000000001a838b13505b26867
k1 = 0x8984A0C8227E8E7B423533303B0FB5796FFF1C7FE55A05A90C1F2B41B45AE167
r1 = 0x375FA4D0979CEEBA073A8E30905B9AA55E60096C9B9513C7D52778446F0BE80C
z1 = 0xC4810C4476AC5411826DD9D5D2FB1F042FCCCFEB68364CACBF619886D0F680CD
s1 = 0x069EBC9C1F3E5AFB0415AE16233EBC8D663F9FEBB428CA6DFC1486F03AD49636


secret:  0x000000000000000000000000000000000000000000000001a838b13505b26867
k1 = 0x52A622856C6415155E61E50D9512DE78643387163BEB555203CEAB9A9733CC0E
r1 = 0x37FDD5382CD43A0E9A26DF5B540BC14A9CB4E41E8B90062E92037CEAC95C1391
z1 = 0x8A665FA3700F0D2284AD073552AECFF63D2C14303E8A696E83FEB77ABA63C4E7
s1 = 0x6C49E5A898D38CCADD7CBCAC924AE54148AF5D9EC2A72E3EA3F26BA7B5806D5D


secret:  0x000000000000000000000000000000000000000000000001a838b13505b26867
k1 = 0x68592D1AA72720AE7333BEB3BD9D6A8E69C0567FB91720318C6289D48227C05D
r1 = 0x5546E2EA6259151CE2BC9040EFD94F8019CC08C5524CA18A77F26DCD74DEB10A
z1 = 0x339207A21F02059DCC8BFC47F62C9EC289F3C3037BDC24C8FEE9174280F182A2
s1 = 0x3E94A32386348F863F6EC148077EB3EBDDFD4C0333C5B2030187F6B8686FE98D


member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Base points and pubkey of nonces exampls:


firt rsz:

('BP', (11558356594904916434672200454110459815025629227368860738740180068802059155766 : 71870243485697470641793755451492706994750343734163850310010253114853844720344 : 1))


('PUBKEY', (70276968741024936396880863405600521556745368553622528485534605216504259497254 : 1352379073670761299421133504648221050189715917074230784619692369884186659163 : 1))

second


('BP', (9221865773095581428242851878533356015088798032807140567471848749386649177664 : 52848749226531299319291663563320019708306060214237112135679743040493551493673 : 1))

('PUBKEY', (114707043604169741197644707954726977126876895597106459084174371755836818783530 : 82818042224261816834083485181900797899640936273569924826357704196466902835616 : 1))





Nonce range as I know , from sender me rsz is about  2**100


Try someone find a nonces,  send me pm for vet privkeys from me
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second



Thank you !!!! Wink


But, no logic with so big nonce, can you generate rsz with nonce 2**30 or less for ex to ,120 puzz pubkey ?



Oh, your rsz is work in my scrypt


('K(pubkey)', (7629256135660504971600927553074108133507503631055291753784190722374696861083 : 25194535474527288837776266966493444390702606185675650052918194213452675896875 : 1)):

('BP', (114224221225710244008833485319885360327960624386540578738397512880450404677861 : 72429032990058375812461306873221236352211543024398501719746160220160202723318 : 1))
sys:1: DeprecationWarning: use the method .hex instead
See https://trac.sagemath.org/26756 for details.

('BP*i', (94396044595232036512156845067099144740980476962933515336874287249977680693713 : 103748817412717866899495297471464484401437733019173646860487930588615334617081 : 1))
stride', 61982023939864607551350919997648825866663898650636854501024779331813868694167, 'hex r', '890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97', 'r %n:', '890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97')
('start range', 109059656781699855293660303596617595953680596646633396165073266196958837652548)
yes!!!
('Found real k:', 3142775905973132413425035830673719814, 'i', 'i%n', 3142775905973132413425035830673719814, 'hex i%n', '25d46d0bccbc08eafa03912b3f2c206')
('i / stride', 108201930346108686079071460207770997208299616649283473366433152632256227467196)

can you please provide the link to the code you used to get this ?


i was answer you in pm
jr. member
Activity: 31
Merit: 5
Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second



Thank you !!!! Wink


But, no logic with so big nonce, can you generate rsz with nonce 2**30 or less for ex to ,120 puzz pubkey ?



Oh, your rsz is work in my scrypt


('K(pubkey)', (7629256135660504971600927553074108133507503631055291753784190722374696861083 : 25194535474527288837776266966493444390702606185675650052918194213452675896875 : 1)):

('BP', (114224221225710244008833485319885360327960624386540578738397512880450404677861 : 72429032990058375812461306873221236352211543024398501719746160220160202723318 : 1))
sys:1: DeprecationWarning: use the method .hex instead
See https://trac.sagemath.org/26756 for details.

('BP*i', (94396044595232036512156845067099144740980476962933515336874287249977680693713 : 103748817412717866899495297471464484401437733019173646860487930588615334617081 : 1))
stride', 61982023939864607551350919997648825866663898650636854501024779331813868694167, 'hex r', '890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97', 'r %n:', '890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97')
('start range', 109059656781699855293660303596617595953680596646633396165073266196958837652548)
yes!!!
('Found real k:', 3142775905973132413425035830673719814, 'i', 'i%n', 3142775905973132413425035830673719814, 'hex i%n', '25d46d0bccbc08eafa03912b3f2c206')
('i / stride', 108201930346108686079071460207770997208299616649283473366433152632256227467196)

can you please provide the link to the code you used to get this ?
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second



Thank you !!!! Wink


But, no logic with so big nonce, can you generate rsz with nonce 2**30 or less for ex to ,120 puzz pubkey ?

What are you trying to do? cloud, you share your rsz code.


my idea is brute force k with bsgs or kangaroo making pubkey and  base point for nonce from rsz
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second



Thank you !!!! Wink


But, no logic with so big nonce, can you generate rsz with nonce 2**30 or less for ex to ,120 puzz pubkey ?



Oh, your rsz is work in my scrypt


('K(pubkey)', (7629256135660504971600927553074108133507503631055291753784190722374696861083 : 25194535474527288837776266966493444390702606185675650052918194213452675896875 : 1)):

('BP', (114224221225710244008833485319885360327960624386540578738397512880450404677861 : 72429032990058375812461306873221236352211543024398501719746160220160202723318 : 1))
sys:1: DeprecationWarning: use the method .hex instead
See https://trac.sagemath.org/26756 for details.

('BP*i', (94396044595232036512156845067099144740980476962933515336874287249977680693713 : 103748817412717866899495297471464484401437733019173646860487930588615334617081 : 1))
stride', 61982023939864607551350919997648825866663898650636854501024779331813868694167, 'hex r', '890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97', 'r %n:', '890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97')
('start range', 109059656781699855293660303596617595953680596646633396165073266196958837652548)
yes!!!
('Found real k:', 3142775905973132413425035830673719814, 'i', 'i%n', 3142775905973132413425035830673719814, 'hex i%n', '25d46d0bccbc08eafa03912b3f2c206')
('i / stride', 108201930346108686079071460207770997208299616649283473366433152632256227467196)
newbie
Activity: 16
Merit: 0
Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second



Thank you !!!! Wink


But, no logic with so big nonce, can you generate rsz with nonce 2**30 or less for ex to ,120 puzz pubkey ?

What are you trying to do? cloud, you share your rsz code. 
member
Activity: 122
Merit: 37

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second



What are the modifications to the LLL_nonce_leakage.py necessary to do this?

My output was
Code:
Fixed Nonce bits = 120           Minimum Signature Required = 3
###############################################################################
Pubkey: 02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
###############################################################################
 Original Matrix
[[115792089237316195423570985008687907852837564279074904382605163141518161494337, 0, 0, 0], [0, 115792089237316195423570985008687907852837564279074904382605163141518161494337, 0, 0], [2467487001254455993260094658069538855875427230575473380664872814242199500527890086092853464270371686385869184249816116248601700397690358585592398162412910, -751681887687496519376062645086290988269867503556637724056603560423474193255164232026755956106024417782854651835316585599337402346461143524154025671989707, 7.52316384526264e-37, 0], [6032443261600613981788543854259123836926830336971803094527945402644254025612712542413636299653573823792930177014767562523084773905042649848397762714980344, 514759699049319332434416455458880129761050389688502952714638126953158121130186708055060830078576096772207625800998356728332240331389528116349768135785841, 0, 87112285931760246646623899502532662132736]]
k= 0x25d46d0bccbc08eafa03912b3f2c206
Generated private key = 0x565ae23651bb5c3141870c7ed367bd270c644ba7227c9975096d16f18ce2f1cd
k= 0x25d46d0bccbc08eafa03912b3f2c206
Generated private key = 0x565ae23651bb5c3141870c7ed367bd270c644ba7227c9975096d16f18ce2f1cd
k= 0x29c9ececdceab18cfba91146e5ded7e
Generated private key = 0x8652756d2bbbf9c014964e0ab7b150fe0b629646426f1172ec2fa2f005ce454d
k= 0x141bf2eb7b3d7b7b5bbf78d4f28bcda
Generated private key = 0x63577c3c016a76d9f81df9606b745bc30be3831923e30ca771f7b25694f9c679

So keys are being generated but not the right one! what am I doing wrong please?
Perhaps you could upload your output for comparison/debugging. Thank you

member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second



Thank you !!!! Wink


But, no logic with so big nonce, can you generate rsz with nonce 2**30 or less for ex to ,120 puzz pubkey ?
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second



Thank you !!!! Wink
jr. member
Activity: 82
Merit: 8
Thank you for your answer. What is nonces ?
I need them for tests and I need know nonces...
Br

Pubkey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
puzzle #120    Grin Grin

---
k1      =  0x00000000000000000000000000000000025d46d0bccbc08eafa03912b3f2c206
r1      =  0x890895144c4a40cd18126d1ce6534e03ab909c8c3692f1cc108fec8e2e4dea97
s1      =  0x51bc4ff0a414d66113e354a7070f47eba8ab76035e776ed2123c7d5ee991b800
z1      =  0xf11d940943f16b4117aea030d0b0cf7f6781e99f2babe05daa574a10b072bc44

k2      =  0x00000000000000000000000000000000029c9ececdceab18cfba91146e5ded7e
r2      =  0x2e772d6ea8cd5dc0b4f06a5f4e5ea057cb65b27a820acb0df711e2855052193f
s2      =  0x83e65d972d090e8d975e5ed99f55c9bbc20fcf692344cf847f3639f4ff026d63
z2      =  0x625ed03aa7e42bb1f65e5546861807a0a52fc52cb20a6b4bdc32b2028e70904b

k3      =  0x000000000000000000000000000000000141bf2eb7b3d7b7b5bbf78d4f28bcda
r3      =  0xb32f2f28d07cd0a9cc139905e1875379b9349fd21ccb838e380215afa5f26eac
s3      =  0x15d30ec6841a4e59bbb87bfc11ebf7cab78b5eb2e5ce742ebe7d07a060ebfc5b
z3      =  0x3677c07287e8742faf74b964476405f1f153466b26234b3461b268ee00676ce8


121 bit :    3  r,s,z      use  LLL_nonce_leakage.py  , you  can  found private key about 1~2 second

member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Good day

Can someone provide 3 examples of r,s,z and nonce data ?


nonce need <= 100

?

Thank you very much.
     R = 64c2e12a01585b692b28b3bfc172df41a865862719a45728298428bc790c48a7
     S = 7e7597a8553fda5bb3ebf990a8671c009a9b25211e873ddaa834e64034c98a53
     Z =  c69268be9eabc84554c2f4905b3977502aa3d52f077bb51dd8cadb502e87b258
PubKey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
======================================================================
[1]
     R =  4818f9d3c3ffa8d65678b626da395aaa34ea2bc5461ffbff5f32a4fe874865a5
     S =  3374c6d2bd43e4414d678b17c9495b09802e10031eac18e5eea7e3d66676f1c1
     Z =  25f297dd6a2a49dbb869b91f8b40d568e0d6e85d3ccc69e495da2552106316d0
PubKey = 02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630

Thank you for your answer. What is nonces ?


I need them for tests and I need know nonces...
Br


newbie
Activity: 16
Merit: 0
Good day

Can someone provide 3 examples of r,s,z and nonce data ?


nonce need <= 100

?

Thank you very much.
     R = 64c2e12a01585b692b28b3bfc172df41a865862719a45728298428bc790c48a7
     S = 7e7597a8553fda5bb3ebf990a8671c009a9b25211e873ddaa834e64034c98a53
     Z =  c69268be9eabc84554c2f4905b3977502aa3d52f077bb51dd8cadb502e87b258
PubKey =  02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
======================================================================
[1]
     R =  4818f9d3c3ffa8d65678b626da395aaa34ea2bc5461ffbff5f32a4fe874865a5
     S =  3374c6d2bd43e4414d678b17c9495b09802e10031eac18e5eea7e3d66676f1c1
     Z =  25f297dd6a2a49dbb869b91f8b40d568e0d6e85d3ccc69e495da2552106316d0
PubKey = 02ceb6cbbcdbdf5ef7150682150f4ce2c6f4807b349827dcdbdd1f2efa885a2630
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Good day

Can someone provide 3 examples of r,s,z and nonce data ?


nonce need <= 100

?

Thank you very much.
Jump to: