Author

Topic: I found a method to reverse public keys to private keys (Read 530 times)

brand new
Activity: 0
Merit: 0

230 bit:

....
.....
..
pubkey:

04a2e0e99ceac47a3dd83f33434523f09ba8b35b773c795fe1c5a370f1e73456e92fb40ba82f4ec 010bdb0800872656a9e1eef6d1627259850bea1671880c779bc


?


I'm running some unrelated tests now, it'll finish soon and i'll send it. if you can send the x and y of the public key it'll be good.

I made dec for pubkey later and send it.


The private key for the 230 bit public key is
1606810226048941903531730621352970454741442315642201293890991507745196

confirm:

print(0x3b99934a8858ffa79d9a6d7a7f3ba4c82ced80430118adfc885d45a9ac


try 256?

after 256 need check 256 with nonce  <252

after after test or real data


so, time to go to "dark web anonimous" is little fare  away ))

It works on real data as you seen.
I can confirm that i already did that on 256 bit keys and it works.
if you want we can chat privately, i don't want to make things too public on the internet.
Hello. I would like to participate in your discussion with Cobras. I am very interested in what approach is in your script. I am going over in my head who you are in the original, I am really very interested.

If you know some advanced math DM me. but don't expect me to provide any tools or codes.
Hello! Thank you for answering, yes I am a newbie but I understand a little, I lack a little experience but I want to learn, just few people want to tell me or teach me. There is such a saying, “Why give a man a fish, give him a fishing rod instead”, I am here for the idea and understanding, this is more important to me.
because I'm a newbie I don't have permission to write you a private message


me to





try sending me a private message now.
can you write to me, I changed the resolution in the settings, you are registered as a newbie, you need to check the box in the settings for the resolution!


Just join this telegram group
https://t.me/+-qZAZBYuwbRlMzI0



https://www.talkimg.com/images/2025/02/10/egjn1.jpeg

you need update setting  Go to
Personal Message Options > Allow newbies to send you PMs.

Well, yes
newbie
Activity: 16
Merit: 0

230 bit:

....
.....
..
pubkey:

04a2e0e99ceac47a3dd83f33434523f09ba8b35b773c795fe1c5a370f1e73456e92fb40ba82f4ec 010bdb0800872656a9e1eef6d1627259850bea1671880c779bc


?


I'm running some unrelated tests now, it'll finish soon and i'll send it. if you can send the x and y of the public key it'll be good.

I made dec for pubkey later and send it.


The private key for the 230 bit public key is
1606810226048941903531730621352970454741442315642201293890991507745196

confirm:

print(0x3b99934a8858ffa79d9a6d7a7f3ba4c82ced80430118adfc885d45a9ac


try 256?

after 256 need check 256 with nonce  <252

after after test or real data


so, time to go to "dark web anonimous" is little fare  away ))

It works on real data as you seen.
I can confirm that i already did that on 256 bit keys and it works.
if you want we can chat privately, i don't want to make things too public on the internet.
Hello. I would like to participate in your discussion with Cobras. I am very interested in what approach is in your script. I am going over in my head who you are in the original, I am really very interested.

If you know some advanced math DM me. but don't expect me to provide any tools or codes.
Hello! Thank you for answering, yes I am a newbie but I understand a little, I lack a little experience but I want to learn, just few people want to tell me or teach me. There is such a saying, “Why give a man a fish, give him a fishing rod instead”, I am here for the idea and understanding, this is more important to me.
because I'm a newbie I don't have permission to write you a private message


me to





try sending me a private message now.
can you write to me, I changed the resolution in the settings, you are registered as a newbie, you need to check the box in the settings for the resolution!


Just join this telegram group
https://t.me/+-qZAZBYuwbRlMzI0


https://www.talkimg.com/images/2025/02/10/egjn1.jpeg

@bitcoinend
you need update setting  Go to
Personal Message Options > Allow newbies to send you PMs.
?
Activity: -
Merit: -

230 bit:

....
.....
..
pubkey:

04a2e0e99ceac47a3dd83f33434523f09ba8b35b773c795fe1c5a370f1e73456e92fb40ba82f4ec 010bdb0800872656a9e1eef6d1627259850bea1671880c779bc


?


I'm running some unrelated tests now, it'll finish soon and i'll send it. if you can send the x and y of the public key it'll be good.

I made dec for pubkey later and send it.


The private key for the 230 bit public key is
1606810226048941903531730621352970454741442315642201293890991507745196

confirm:

print(0x3b99934a8858ffa79d9a6d7a7f3ba4c82ced80430118adfc885d45a9ac


try 256?

after 256 need check 256 with nonce  <252

after after test or real data


so, time to go to "dark web anonimous" is little fare  away ))

It works on real data as you seen.
I can confirm that i already did that on 256 bit keys and it works.
if you want we can chat privately, i don't want to make things too public on the internet.
Hello. I would like to participate in your discussion with Cobras. I am very interested in what approach is in your script. I am going over in my head who you are in the original, I am really very interested.

If you know some advanced math DM me. but don't expect me to provide any tools or codes.
Hello! Thank you for answering, yes I am a newbie but I understand a little, I lack a little experience but I want to learn, just few people want to tell me or teach me. There is such a saying, “Why give a man a fish, give him a fishing rod instead”, I am here for the idea and understanding, this is more important to me.
because I'm a newbie I don't have permission to write you a private message


me to


try sending me a private message now.
can you write to me, I changed the resolution in the settings, you are registered as a newbie, you need to check the box in the settings for the resolution!


Just join this telegram group
https://t.me/+-qZAZBYuwbRlMzI0
brand new
Activity: 0
Merit: 0

230 bit:

....
.....
..
pubkey:

04a2e0e99ceac47a3dd83f33434523f09ba8b35b773c795fe1c5a370f1e73456e92fb40ba82f4ec 010bdb0800872656a9e1eef6d1627259850bea1671880c779bc


?


I'm running some unrelated tests now, it'll finish soon and i'll send it. if you can send the x and y of the public key it'll be good.

I made dec for pubkey later and send it.


The private key for the 230 bit public key is
1606810226048941903531730621352970454741442315642201293890991507745196

confirm:

print(0x3b99934a8858ffa79d9a6d7a7f3ba4c82ced80430118adfc885d45a9ac


try 256?

after 256 need check 256 with nonce  <252

after after test or real data


so, time to go to "dark web anonimous" is little fare  away ))

It works on real data as you seen.
I can confirm that i already did that on 256 bit keys and it works.
if you want we can chat privately, i don't want to make things too public on the internet.
Hello. I would like to participate in your discussion with Cobras. I am very interested in what approach is in your script. I am going over in my head who you are in the original, I am really very interested.

If you know some advanced math DM me. but don't expect me to provide any tools or codes.
Hello! Thank you for answering, yes I am a newbie but I understand a little, I lack a little experience but I want to learn, just few people want to tell me or teach me. There is such a saying, “Why give a man a fish, give him a fishing rod instead”, I am here for the idea and understanding, this is more important to me.
because I'm a newbie I don't have permission to write you a private message


me to


try sending me a private message now.
can you write to me, I changed the resolution in the settings, you are registered as a newbie, you need to check the box in the settings for the resolution!
newbie
Activity: 16
Merit: 0

230 bit:

....
.....
..
pubkey:

04a2e0e99ceac47a3dd83f33434523f09ba8b35b773c795fe1c5a370f1e73456e92fb40ba82f4ec 010bdb0800872656a9e1eef6d1627259850bea1671880c779bc


?


I'm running some unrelated tests now, it'll finish soon and i'll send it. if you can send the x and y of the public key it'll be good.

I made dec for pubkey later and send it.


The private key for the 230 bit public key is
1606810226048941903531730621352970454741442315642201293890991507745196

confirm:

print(0x3b99934a8858ffa79d9a6d7a7f3ba4c82ced80430118adfc885d45a9ac


try 256?

after 256 need check 256 with nonce  <252

after after test or real data


so, time to go to "dark web anonimous" is little fare  away ))

It works on real data as you seen.
I can confirm that i already did that on 256 bit keys and it works.
if you want we can chat privately, i don't want to make things too public on the internet.
Hello. I would like to participate in your discussion with Cobras. I am very interested in what approach is in your script. I am going over in my head who you are in the original, I am really very interested.

If you know some advanced math DM me. but don't expect me to provide any tools or codes.
Hello! Thank you for answering, yes I am a newbie but I understand a little, I lack a little experience but I want to learn, just few people want to tell me or teach me. There is such a saying, “Why give a man a fish, give him a fishing rod instead”, I am here for the idea and understanding, this is more important to me.
because I'm a newbie I don't have permission to write you a private message


me to


try sending me a private message now.

"This message shows me what I need to do."

User 'bitcoinend' is a newbie, but your options are set such that you cannot receive PMs from newbies. Therefore, you cannot send PMs to newbies, either.


Write your email, or are you trying to send me a direct message?
?
Activity: -
Merit: -

230 bit:

....
.....
..
pubkey:

04a2e0e99ceac47a3dd83f33434523f09ba8b35b773c795fe1c5a370f1e73456e92fb40ba82f4ec 010bdb0800872656a9e1eef6d1627259850bea1671880c779bc


?


I'm running some unrelated tests now, it'll finish soon and i'll send it. if you can send the x and y of the public key it'll be good.

I made dec for pubkey later and send it.


The private key for the 230 bit public key is
1606810226048941903531730621352970454741442315642201293890991507745196

confirm:

print(0x3b99934a8858ffa79d9a6d7a7f3ba4c82ced80430118adfc885d45a9ac


try 256?

after 256 need check 256 with nonce  <252

after after test or real data


so, time to go to "dark web anonimous" is little fare  away ))

It works on real data as you seen.
I can confirm that i already did that on 256 bit keys and it works.
if you want we can chat privately, i don't want to make things too public on the internet.
Hello. I would like to participate in your discussion with Cobras. I am very interested in what approach is in your script. I am going over in my head who you are in the original, I am really very interested.

If you know some advanced math DM me. but don't expect me to provide any tools or codes.
Hello! Thank you for answering, yes I am a newbie but I understand a little, I lack a little experience but I want to learn, just few people want to tell me or teach me. There is such a saying, “Why give a man a fish, give him a fishing rod instead”, I am here for the idea and understanding, this is more important to me.
because I'm a newbie I don't have permission to write you a private message


me to


try sending me a private message now.
newbie
Activity: 16
Merit: 0

230 bit:

....
.....
..
pubkey:

04a2e0e99ceac47a3dd83f33434523f09ba8b35b773c795fe1c5a370f1e73456e92fb40ba82f4ec 010bdb0800872656a9e1eef6d1627259850bea1671880c779bc


?


I'm running some unrelated tests now, it'll finish soon and i'll send it. if you can send the x and y of the public key it'll be good.

I made dec for pubkey later and send it.


The private key for the 230 bit public key is
1606810226048941903531730621352970454741442315642201293890991507745196

confirm:

print(0x3b99934a8858ffa79d9a6d7a7f3ba4c82ced80430118adfc885d45a9ac


try 256?

after 256 need check 256 with nonce  <252

after after test or real data


so, time to go to "dark web anonimous" is little fare  away ))

It works on real data as you seen.
I can confirm that i already did that on 256 bit keys and it works.
if you want we can chat privately, i don't want to make things too public on the internet.
Hello. I would like to participate in your discussion with Cobras. I am very interested in what approach is in your script. I am going over in my head who you are in the original, I am really very interested.

If you know some advanced math DM me. but don't expect me to provide any tools or codes.
Hello! Thank you for answering, yes I am a newbie but I understand a little, I lack a little experience but I want to learn, just few people want to tell me or teach me. There is such a saying, “Why give a man a fish, give him a fishing rod instead”, I am here for the idea and understanding, this is more important to me.
because I'm a newbie I don't have permission to write you a private message


me to
brand new
Activity: 0
Merit: 0

230 bit:

[["0xdce394502671a3472fa7ec41b0ab69963f39482d18f54287b5f366c04c74ce7e", "0x950459a3712bd78d35232a86c301013befb49c5c69db88e777157a6f82eb453c", "0xb9d4daec5a40a0e3d14ce54667dc2ce366369772f5c480e8ba8bde8c7f7c9f1b"], ["0x852bebc37319ba1a0f3bf452b36f67536db30705115943957394090444b9d1c7", "0x8efc83369b5d3c1fd4babb15f86cb72ec2ad335027d5be254a55c22c2922ee0c", "0x10415d67659ef1721de51ca3bb49d2c876069b3da864538f78805c822e3233a8"], ["0xdcfbb9ef5fa6a26abb29aae0a2a41ad8e5e10899b12b387fa3cdffe7e99dc530", "0x9491d52ddee21b79f140edeef94b82352d4bd46edea867cc1745f35e793a965f", "0x6d95d1cc02b662c55cc8dfdf5656f5ab7fc4488805130d7feb4fb6b3fd65ab7"], ["0x854ec7b688feca4735aebcf6d8c281b0b49bd031943de9d7ec4718d10f8ae3bc", "0xeec3dd6b212a5759f3389458d358bb37e6f5303dbf5e384aa386e6d7c84b39c9", "0xf7673185e083db8e54b7a5b83b545747d90fd1c2064fa1091d394d491ede0e45"], ["0xf7f90f3c03bd5c87fe76fefd2d91903faeaeb3119cae109378898c6fd744c00d", "0xf0281f25b1d67bb37740dc54582a275d6f7ecb51d09c7f4ab501f3da84bd75e8", "0xe141e76eb1630ed09f26c5690b5cff366acf73b09449fd532277baf6bd6804ac"], ["0x9d95a2ba18cdb6cf55e6c43696da0b32361f22a6941c3e45be634672d8392b6e", "0x63fbf92440443f326d20c51981b69b509d296d2f64fe198c276f7c77c4e83033", "0x2c74261400e10ce761dcefb1f2ff0b69c91a3afb9ec376bce14885ff901aa14d"], ["0xc3d602e432a47e5b79e7fb5d1d638f35031118f26c3fc1a2b1d2c1b3114f6d75", "0xa0e7fd384990c93802b1ba6fdbcd57da16bbc6c4a883a74e4e149624c5410728", "0xa8bb9b81d623bd16a1908367ae6d43c10c8e14df73d299c4195fb96285b500dc"], ["0xee3ccd41f20240905dec84e7a291e32527b054f2069327e4f1b965e4cad7dd26", "0xba357025970f308b424f3080c5529cb31dc6a030226f1f57b05ffb24c329ea7e", "0x3326ac504b004e16a2a646e3d4adbde07aea27a387ee674c2ed9eadfc4cf5376"], ["0x82022ec18e1f32a443d2f5938681fb9159013fb91f804378d5b96c1649f35dbf", "0xe7605b8db8138314c1c7d6c576d9557ed2a72bce5c9592654d134ff5c9e5d044", "0xf767efe06026b5142be7b80cc149d57606c814c74b65285127eb652c18c9aa0"], ["0xeda2005707df7793446995255c4087f5baa7792a1cbdb95b69a836a27438c888", "0x23c35f861a9726309713144c5f13898140b06905ebe2ecda675edb4ea80e998c", "0x9911c7e2a14c070e652c5d8de355039d9db7afcd33618bb0ba8e7bea37cedf99"]]

pubkey:

04a2e0e99ceac47a3dd83f33434523f09ba8b35b773c795fe1c5a370f1e73456e92fb40ba82f4ec 010bdb0800872656a9e1eef6d1627259850bea1671880c779bc


?


I'm running some unrelated tests now, it'll finish soon and i'll send it. if you can send the x and y of the public key it'll be good.

I made dec for pubkey later and send it.


The private key for the 230 bit public key is
1606810226048941903531730621352970454741442315642201293890991507745196

confirm:

print(0x3b99934a8858ffa79d9a6d7a7f3ba4c82ced80430118adfc885d45a9ac


try 256?

after 256 need check 256 with nonce  <252

after after test or real data


so, time to go to "dark web anonimous" is little fare  away ))

It works on real data as you seen.
I can confirm that i already did that on 256 bit keys and it works.
if you want we can chat privately, i don't want to make things too public on the internet.
Hello. I would like to participate in your discussion with Cobras. I am very interested in what approach is in your script. I am going over in my head who you are in the original, I am really very interested.

If you know some advanced math DM me. but don't expect me to provide any tools or codes.
Hello! Thank you for answering, yes I am a newbie but I understand a little, I lack a little experience but I want to learn, just few people want to tell me or teach me. There is such a saying, “Why give a man a fish, give him a fishing rod instead”, I am here for the idea and understanding, this is more important to me.
because I'm a newbie I don't have permission to write you a private message
brand new
Activity: 0
Merit: 0
I've been on this forum for a while, and all the methods to recover a private key were trash.

I'm very skeptical about yours, but I was kind of surprised by the examples you showed.


Can you please try this one? 135 bits

The signatures are in the format you requested Z,R,S.


Public Key (X, Y):
(14583650402052046191194717552574143597839470300155777702187845716125065931581, 110658969513486452358151052273695883261147073763470201295459829818398609189289)

[["0x5f3fa0301abc8851184a4f2eb341943b1ed5ecb91b5dea13d4347005f1e5d793", "0xc9d9738562ff79a333302d5d1480c730995d020206ea1fd34d3f934b3169fa24", "0xadc5ba964b06250cf81e7dc159b74b20c253d25769267cd83e3680fefb326332"], ["0x7383448524bc17c9756b04bafca6e574bd7511081c8ed181417927bbd01a3674", "0x4da378b7d2c580914451ba8c659227cbcd85665c4bbc9cc8d131f29d85cb48be", "0xc99e32b635042baa18eceae34e328b537a27d21aad44b0230b6588beba15f1dc"], ["0x15056cf8fad9af7ec28a30d8e45bbaa7ad05e8121f3fafef87458d2a3e44d93c", "0x97a21c2faced7afdeba2d6d265448bc2945e4bfeb19dec3dd2eef471ce17e9a8", "0xfd1ad41f64ff59981064806fadfe974e41e302804280ad8819d6c1f1b0919d18"], ["0x1b7c012423861656ffd4ada338f290a7cf041eebd12da09c00cbe0dde3903266", "0xd69b9d36d66a93c29c3c554685587088f5f01fcd8fd16f90b7111916f59bdc58", "0x5f83b65256ad735a948166de9c1942f810b79714d6b357e8af7c1ab8edda0950"], ["0xdf0e5d08fea8de152fbd0dfdf661c6006a7821dadecc91cfabe3b9b4d69f6f7b", "0x7b72d864f943496e52d08b764b5832253db5ba2becc68200e23a985ddbde418b", "0x51de05c88e5dc55c8b0f2c278db42746f44e9f2ffcfb6d3aa36455a468fed82a"], ["0x3a2bd0d713b6d66893168e1cf4305839220bbe17d123e966baa35a7e31e8e7ac", "0x7500ccbdf0128827c5977f5f0ba017f5f460857d66948827d1641131192f5b80", "0x96948bdb4e4c79e95ca7ac16ef19147551cc2868f13a8aeacd73385c35e1a612"], ["0x5dde8cd500d2660078da55702e0d67a2eac9cc873115d3079c9c69286669e5a8", "0x983663cb72c652ec405b15173e974dda251a98edce44b99c3dee4650aec88a60", "0xa4a3fd9571e8b4fac0645e6a06c5571505818acc16230e530709ec7a8fff0e51"], ["0x67c4bb5c8dac73631467bb83e1a4a2945d816011613eca0fbfa91d3d39eda089", "0x1db0fc70d3759bc9234d4b05b512a2a389cc487b165bcfef4b47e5339ad88bc0", "0x41042572a25bcdfb360da3376f091738621b202d9324b78c8af71f06a83b9105"], ["0x7cdff47c626778d697776f766b83674ef90510d5721c63e1575636aeebc134c8", "0x61191aa05488263c68ccb63ab4d52b79643b4f91253a8963286b62d933248193", "0x319c8a71d1e53e9f05549c68706d51cdd29c5086be916260381b1a9807fb06b9"], ["0x56515175f9930ad039e6250fc08cc1c9c76c362d6428f8f8be601fea53490922", "0x94700ebfa50beede7309e5715054d66ada2e7bad436d1d28a71503b8150a6f4d", "0xa357ee0276188750db58933c1a2a432334180d80f393bb485e9cefd72ee250fe"]]


There have already been examples, what other proof do you need?
brand new
Activity: 0
Merit: 0
I've been on this forum for a while, and all the methods to recover a private key were trash.

I'm very skeptical about yours, but I was kind of surprised by the examples you showed.


Can you please try this one? 135 bits

The signatures are in the format you requested Z,R,S.


Public Key (X, Y):
(14583650402052046191194717552574143597839470300155777702187845716125065931581, 110658969513486452358151052273695883261147073763470201295459829818398609189289)

[["0x5f3fa0301abc8851184a4f2eb341943b1ed5ecb91b5dea13d4347005f1e5d793", "0xc9d9738562ff79a333302d5d1480c730995d020206ea1fd34d3f934b3169fa24", "0xadc5ba964b06250cf81e7dc159b74b20c253d25769267cd83e3680fefb326332"], ["0x7383448524bc17c9756b04bafca6e574bd7511081c8ed181417927bbd01a3674", "0x4da378b7d2c580914451ba8c659227cbcd85665c4bbc9cc8d131f29d85cb48be", "0xc99e32b635042baa18eceae34e328b537a27d21aad44b0230b6588beba15f1dc"], ["0x15056cf8fad9af7ec28a30d8e45bbaa7ad05e8121f3fafef87458d2a3e44d93c", "0x97a21c2faced7afdeba2d6d265448bc2945e4bfeb19dec3dd2eef471ce17e9a8", "0xfd1ad41f64ff59981064806fadfe974e41e302804280ad8819d6c1f1b0919d18"], ["0x1b7c012423861656ffd4ada338f290a7cf041eebd12da09c00cbe0dde3903266", "0xd69b9d36d66a93c29c3c554685587088f5f01fcd8fd16f90b7111916f59bdc58", "0x5f83b65256ad735a948166de9c1942f810b79714d6b357e8af7c1ab8edda0950"], ["0xdf0e5d08fea8de152fbd0dfdf661c6006a7821dadecc91cfabe3b9b4d69f6f7b", "0x7b72d864f943496e52d08b764b5832253db5ba2becc68200e23a985ddbde418b", "0x51de05c88e5dc55c8b0f2c278db42746f44e9f2ffcfb6d3aa36455a468fed82a"], ["0x3a2bd0d713b6d66893168e1cf4305839220bbe17d123e966baa35a7e31e8e7ac", "0x7500ccbdf0128827c5977f5f0ba017f5f460857d66948827d1641131192f5b80", "0x96948bdb4e4c79e95ca7ac16ef19147551cc2868f13a8aeacd73385c35e1a612"], ["0x5dde8cd500d2660078da55702e0d67a2eac9cc873115d3079c9c69286669e5a8", "0x983663cb72c652ec405b15173e974dda251a98edce44b99c3dee4650aec88a60", "0xa4a3fd9571e8b4fac0645e6a06c5571505818acc16230e530709ec7a8fff0e51"], ["0x67c4bb5c8dac73631467bb83e1a4a2945d816011613eca0fbfa91d3d39eda089", "0x1db0fc70d3759bc9234d4b05b512a2a389cc487b165bcfef4b47e5339ad88bc0", "0x41042572a25bcdfb360da3376f091738621b202d9324b78c8af71f06a83b9105"], ["0x7cdff47c626778d697776f766b83674ef90510d5721c63e1575636aeebc134c8", "0x61191aa05488263c68ccb63ab4d52b79643b4f91253a8963286b62d933248193", "0x319c8a71d1e53e9f05549c68706d51cdd29c5086be916260381b1a9807fb06b9"], ["0x56515175f9930ad039e6250fc08cc1c9c76c362d6428f8f8be601fea53490922", "0x94700ebfa50beede7309e5715054d66ada2e7bad436d1d28a71503b8150a6f4d", "0xa357ee0276188750db58933c1a2a432334180d80f393bb485e9cefd72ee250fe"]]

member
Activity: 239
Merit: 53
New ideas will be criticized and then admired.
can you, or anyone else just try my code and send the public key + 10 signatures?

Why would you need 10 signatures or more? According to mathematics, if there were a way to find or derive the private key with 2, it would be sufficient, because the path would be to derive the nonce, and once this is done, you obtain the private key. As far as I know, this is only possible if you use the same nonce in 2 signatures or when it is insecure. Why 200 bits, what is special about this? 200 bits are still secure today.

I recommend inserting code correctly with :

Code:
newbie
Activity: 16
Merit: 0
@COBRAS
@bitcoinend
I want to learn,advanced math DM me." reverse public keys to private keys"
How does your math work? Can you explain it clearly with some examples?
dm me thanks
newbie
Activity: 12
Merit: 0
Public Key (Hex): 0233c451545bd7be15ef5c62e20ba46d3517c0852536e7d2196777d2b3ad3b831d

Signature 1:
R1 = 0x61bff9a815528c2ef33a3096f650eac34a4a7eccb2b7266e221004245eaf1da9
S1 = 0x130f6d2470e1be99ecc6d64acb38ad4050d4a0a1c71194ac6671dad6b645b47
Z1 = 0xcfa395b2d3a9069352d8a7ba6ea6c673226cb1dc57daddcf8c97000fc5d17256

Signature 2:
R2 = 0xe80fcdf2163ed438c039bc2dfd93f501c65c66c1350a0a9de5c75664715a7e47
S2 = 0x5c2367293704914d3a7d3d5f917570a451864d3bc69e3cf6c91f5cda38a49cf4
Z2 = 0x5d9d720a8bd823ad5a6e37dbe6ffefcbbbbce95da518be3a0452bc1b2e74332a

Signature 3:
R3 = 0x6f3e2ade374268b985929a64f5ab10741caee3762eefc51c65ae185e44a329aa
S3 = 0x26889dd7054e89934f545d85c9ab6540606eef5a7c6027f8a79a6046c7e9363d
Z3 = 0xf768a0b46cef5816c1ac94a4efecf01390c58bc974b1e8fd45a75398313c6dad


The private key and random number are both less than 200 bits.
Can you calculate my private key? I want to try whether what you said is true or false.
newbie
Activity: 16
Merit: 0
Is the nonce you used below 200 bits also?

try this new one i used

pubxy= 0xdc3da318f9a9b7ffc82ccffa29622895091606885c8e4ca0c5ac19dc70266c5 0xf6d4b94cdbc3ebb9eb6e059fad87ff41a4b4d2a3d470ec4a508bab55e814856a
(6226108126078494539249842724718857207859664379045345395490556241357844932293 : 111644811224390640995519078136711738974816348459514100801436649687719020365162 : 1)

tra1 1
R =  0x29065d1942c6acd7a68a7f9d01c4b339732cc82a2d8c6408aca59674f19e4053
S =  0x41c620f18bf3a17e390e55417694e43cddba039b4233820e923c44483649e1bb
Z =  0x716cd00a8088b0e6c6a68335a90c13f80a0dc4a0cb56d1308eda339eaf856165

tra2 2
R =  0x82c3f66f2ef8b968775dd82a33efec056442e76abece38877279d59b724aea7
S =  0xfe5db6f15e1640738ca8db3ee97d78328489d875d2c3b1fe96a23813a0eee215
Z =  0xbf4977bbd35121592f3a717eca14d2c63e8b904b1ee978165f9d2cb00a1539ed

tra3 3
R =  0xee9e7642524b5a7c469eb041b533b6164d77b17e8eb7511b25f3a7b73401be2c
S =  0xbaf81a49ce271e110ccdd7ae42659cc8901f5887df1181a812a4ef9170ec9432
Z =  0xb03fd20ecbe5a0d2d9ef1c58dca2835ca3c7786584442225e4ed52393a53aaa0

tra4 4
R =  0x530c4308a0c05018354eb6516adfb6bb3db4ffe97e36f34a9e4a489605a7e2e9
S =  0x16a023cce5425e2952983b01978167913c20103b69fd324e1e44e87f62f4efb7
Z =  0x7afa18a10f7ce8773445fae27f91fc4a9bc2bdf885ff679817ccf4f81097e18

tra5 5
R =  0x1fde899eb313644d9a4564ff477a0e35e609f712c5b6fa1bb086f311d2000cb9
S =  0xb2148db4a70fa5b75ce2cb989276f202b03535249dc7e2e23952667f8359ef26
Z =  0x913b27459ecd87f1c045d2773831564c7ccc4902cace6a0b53c2e6d1386e62f2

tra6 6
R =  0x42775d4bea75afe5cb4b20087f7797d802ce055a732cfa0c221e8850fbc19b9f
S =  0x4054bbd9b1e05e60c1e374d91159057d2ec61970fea8e3851ae578267821230
Z =  0xf7a18a040db5986b21cb54dd89776f37abbdde32c7a45aa67b76f70cad18dbdb

tra7 7
R =  0xda4eeb19ce648156ad463b6261ec7da1c6873fc610f42bbdbea9f95c4d7472db
S =  0xbafba446de71d51dff520c543d8d477770962b0c2bab3e2e25d4ca6180c0c16e
Z =  0xfda38488d4875951cd3ddef92332490fd89d263f5990f5fd7aa0576a90d0c384

tra8 8
R =  0x58796c745fab889538c2eb55730e90e7c0d11e9ff64bb6722464376b40bdb929
S =  0xa322b50e813ccf125aa95aa9fe08838fcdb3189dd9443be9ba4bae5650859a4d
Z =  0x9a586b8d35453448752b56cf89f466767f7a7235911d1e48a28b7372ec3267ca

tra9 9
R =  0xe5c367a4a587685efb55be6b82f1a43b7bddc331506c2eba64ee47152a98c2c6
S =  0xe68f548cc95f4e46698c5be60e3d07f3645b3719b999ffb54553737a2d7b81c1
Z =  0xae75bd7b2477873ca82e9901a64ef1e17aefcab11212e5fe98a81edfbccdda5b

tra10 10
R =  0x7e9eae99ac7a9ce39f375dc6eed14f9a8292305d1b053dbf60c1c15d4750090
S =  0xdc29bb88f195c31ae33616d642b4edff3d68912929c4eff0a254356a2ffd71a7
Z =  0x9b1bd589ac1545d85fdf446d6c2db79a5fdfb4c4abcf5adeab483c5376eb1c95


And,i can't dm you, i got this message
User 'bitcoinend' has not chosen to allow messages from newbies. You should post in their relevant thread to remind them to enable this setting.


Quote
If you know some advanced math DM me

"How does your math work? Can you explain it clearly with some examples?"
dm me thanks

?
Activity: -
Merit: -
@bitcoinend

public key with a private key which is below 200 bits



pubxy= 0xdc3da318f9a9b7ffc82ccffa29622895091606885c8e4ca0c5ac19dc70266c5 0xf6d4b94cdbc3ebb9eb6e059fad87ff41a4b4d2a3d470ec4a508bab55e814856a

tra1 1
R =  0xae453cbb25af04e93b900fe924a445a1a931a8fd944679596ab1d052bd8506fe
S =  0x324d6267006fe3e3309f2f06c330838ca6e70fb55b0717c7a86d1266c4a0457f
Z =  0xbc50a7fefef9169d587d2c9e54fe1613f910b48afdd3e3758ece1ab17950914b

tra2 2
R =  0x110dd7540520916f99f46531e3c938864ab03c880cb2e8d13e995762e811c6a2
S =  0xd24e648f492f8b0d8bec6c2e7b3757870b523dd72ab2c1ed978dc8fcc34f2963
Z =  0x4ec53ffef9f38727aa9551427237133244bcb589b4f75cbb144bb5dd6a5e754b

tra3 3
R =  0x257efbad1f9d386983756d5cc1cc8f71583350c8ff433c12cb7216068811f4dd
S =  0xc8a44837f6b882de8d6158b59614d9037948a062e89340da67023067bcd475
Z =  0xfe82deff7d6ee1a8342645b394ee5a1dac98461d2362438e9a5f213cfd3167b1

tra4 4
R =  0xa7c13ef8f2d33b1aad591fce8023a998f6ed5b6bf45883965e12cb85a9b0ec83
S =  0x108a34bfdf343fbb47ed64bc0077b0e0a39a0266adecf83cc5cc6679a9929c8
Z =  0x5bf41a633d36d8f575e328028f397287c4ff73813275d70ac68e6139985d450c

tra5 5
R =  0x490659229fb13cf284eb338b4caec2484ad015b42e3932dd02e64c79ca510574
S =  0x2a8dc410f49316f943b52bb545ca1b03f238baa6a6442254ba3f85087f02e78a
Z =  0x8386442b64fc3ffb5b9aeb0ceb975d7086cae739675f24c8bbda39c0ce564580

tra6 6
R =  0x9c41c3e98ea1e1dcaff809e4d775aaacfcd9b3eff50a46a7163686b0d7b090d1
S =  0xc0f01d0782d774d9d403b5f3990cb9392a573104f115abadd40cc75c03a7fcd
Z =  0x548e573cedae4c9fa2914dbab9eb45c07fd69afc9441394a7a13bf25d45612bb

tra7 7
R =  0xd0b892e487b29d46cb9e2c8218af768e91da2a06bdd916a93cdbf1068e00bd1d
S =  0xec08346927d99c5fe4d12230d12fd341ae42b35975b6a40bf5f11d62e1b9d378
Z =  0x31b74501ae5d2223c6c785b8d0015c11e3eea7d1aa4f17752ef6be06133487f5

tra8 8
R =  0x94794788a0a2f8a521f43c7623daf0ab6f35c3ed0abb175ad171905058b1ada3
S =  0x2adea86c2661f2a7bb3da646c0114e4299ee08e2b7d7278f8fdca7455de37669
Z =  0xf3de452d022f2e82a830e8c2943686f16c373e4d32d863d20179adf42c9aad34

tra9 9
R =  0xff3bcf8fc1bc1c2b525994b1a47a97b08355a2805d6a89f91ecfe2d5e620d609
S =  0x5f8f3ebd0ceff8972765818c1b2a2bc43997580d2b44388ea276f20e42cf6a89
Z =  0x7adbe22a81fd7360c46e876cc5cd23be35c948aaba17c718b1a3788ac49f1017

tra10 10
R =  0xe69527a57687942b8d46103a836fd478ef7e7b040b40e87a89399230909f33db
S =  0x77655a379d3b320ec39893303408fa1a5f2c5ebe95e3f44f12384a73cc5768d1
Z =  0xee25160d6069ce960ce9e86b4712efb25644fa7b216993ef15e155bc0f854fa6


show the priv key ?



Is the nonce you used below 200 bits also?
newbie
Activity: 16
Merit: 0
@bitcoinend

public key with a private key which is below 200 bits



pubxy= 0xdc3da318f9a9b7ffc82ccffa29622895091606885c8e4ca0c5ac19dc70266c5 0xf6d4b94cdbc3ebb9eb6e059fad87ff41a4b4d2a3d470ec4a508bab55e814856a

tra1 1
R =  0xae453cbb25af04e93b900fe924a445a1a931a8fd944679596ab1d052bd8506fe
S =  0x324d6267006fe3e3309f2f06c330838ca6e70fb55b0717c7a86d1266c4a0457f
Z =  0xbc50a7fefef9169d587d2c9e54fe1613f910b48afdd3e3758ece1ab17950914b

tra2 2
R =  0x110dd7540520916f99f46531e3c938864ab03c880cb2e8d13e995762e811c6a2
S =  0xd24e648f492f8b0d8bec6c2e7b3757870b523dd72ab2c1ed978dc8fcc34f2963
Z =  0x4ec53ffef9f38727aa9551427237133244bcb589b4f75cbb144bb5dd6a5e754b

tra3 3
R =  0x257efbad1f9d386983756d5cc1cc8f71583350c8ff433c12cb7216068811f4dd
S =  0xc8a44837f6b882de8d6158b59614d9037948a062e89340da67023067bcd475
Z =  0xfe82deff7d6ee1a8342645b394ee5a1dac98461d2362438e9a5f213cfd3167b1

tra4 4
R =  0xa7c13ef8f2d33b1aad591fce8023a998f6ed5b6bf45883965e12cb85a9b0ec83
S =  0x108a34bfdf343fbb47ed64bc0077b0e0a39a0266adecf83cc5cc6679a9929c8
Z =  0x5bf41a633d36d8f575e328028f397287c4ff73813275d70ac68e6139985d450c

tra5 5
R =  0x490659229fb13cf284eb338b4caec2484ad015b42e3932dd02e64c79ca510574
S =  0x2a8dc410f49316f943b52bb545ca1b03f238baa6a6442254ba3f85087f02e78a
Z =  0x8386442b64fc3ffb5b9aeb0ceb975d7086cae739675f24c8bbda39c0ce564580

tra6 6
R =  0x9c41c3e98ea1e1dcaff809e4d775aaacfcd9b3eff50a46a7163686b0d7b090d1
S =  0xc0f01d0782d774d9d403b5f3990cb9392a573104f115abadd40cc75c03a7fcd
Z =  0x548e573cedae4c9fa2914dbab9eb45c07fd69afc9441394a7a13bf25d45612bb

tra7 7
R =  0xd0b892e487b29d46cb9e2c8218af768e91da2a06bdd916a93cdbf1068e00bd1d
S =  0xec08346927d99c5fe4d12230d12fd341ae42b35975b6a40bf5f11d62e1b9d378
Z =  0x31b74501ae5d2223c6c785b8d0015c11e3eea7d1aa4f17752ef6be06133487f5

tra8 8
R =  0x94794788a0a2f8a521f43c7623daf0ab6f35c3ed0abb175ad171905058b1ada3
S =  0x2adea86c2661f2a7bb3da646c0114e4299ee08e2b7d7278f8fdca7455de37669
Z =  0xf3de452d022f2e82a830e8c2943686f16c373e4d32d863d20179adf42c9aad34

tra9 9
R =  0xff3bcf8fc1bc1c2b525994b1a47a97b08355a2805d6a89f91ecfe2d5e620d609
S =  0x5f8f3ebd0ceff8972765818c1b2a2bc43997580d2b44388ea276f20e42cf6a89
Z =  0x7adbe22a81fd7360c46e876cc5cd23be35c948aaba17c718b1a3788ac49f1017

tra10 10
R =  0xe69527a57687942b8d46103a836fd478ef7e7b040b40e87a89399230909f33db
S =  0x77655a379d3b320ec39893303408fa1a5f2c5ebe95e3f44f12384a73cc5768d1
Z =  0xee25160d6069ce960ce9e86b4712efb25644fa7b216993ef15e155bc0f854fa6


show the priv key ?
newbie
Activity: 12
Merit: 0
Public Key (Hex): 0386747aa730e55346fe6609721350cd84a4f5d22308bcbffc25017c287f1f8b5c

Signature 1:
R1 = 0x471e9702f12cf6872696904e07496589009676aa4720b4c951b2e2253bd1968e
S1 = 0x5934656d4316e4a5b757a7017dde8fb5bf9d040ef9df0d4d8f90cc7d4355a8b2
Z1 = 0xcfa395b2d3a9069352d8a7ba6ea6c673226cb1dc57daddcf8c97000fc5d17256
k1 = 0xee39998957fc2aeaf7a995e16cf8757f9d697ad5 (Weak Nonce)

Signature 2:
R2 = 0xff391701e487807e0135f0b489d06aec6dbb80f726a768281369fa4bb8fa47f5
S2 = 0xb9ff0b62b77c0b3c9a296dba47eabbd2ef404423badc5168796aca550622eb9
Z2 = 0x5d9d720a8bd823ad5a6e37dbe6ffefcbbbbce95da518be3a0452bc1b2e74332a
k2 = 0xea2fdc05cb42d93af1683d4de96f2e18b80009bf (Weak Nonce)


Can you calculate my private key? I want to try whether what you said is true or false.

Again,
Anyone can, since you provided the K (nonce) values. Please do note provide them.
Do provide however 10 signatures in the JSON format, as i said before. make sure the key and nonce are below 230 bits.
If you tell me K it's like you tell me the private key yourself.



Does your method have practical application?
Can you obtain the corresponding public key and K value of the other party from transaction information in the Bitcoin network?
?
Activity: -
Merit: -
Public Key (Hex): 0386747aa730e55346fe6609721350cd84a4f5d22308bcbffc25017c287f1f8b5c

Signature 1:
R1 = 0x471e9702f12cf6872696904e07496589009676aa4720b4c951b2e2253bd1968e
S1 = 0x5934656d4316e4a5b757a7017dde8fb5bf9d040ef9df0d4d8f90cc7d4355a8b2
Z1 = 0xcfa395b2d3a9069352d8a7ba6ea6c673226cb1dc57daddcf8c97000fc5d17256
k1 = 0xee39998957fc2aeaf7a995e16cf8757f9d697ad5 (Weak Nonce)

Signature 2:
R2 = 0xff391701e487807e0135f0b489d06aec6dbb80f726a768281369fa4bb8fa47f5
S2 = 0xb9ff0b62b77c0b3c9a296dba47eabbd2ef404423badc5168796aca550622eb9
Z2 = 0x5d9d720a8bd823ad5a6e37dbe6ffefcbbbbce95da518be3a0452bc1b2e74332a
k2 = 0xea2fdc05cb42d93af1683d4de96f2e18b80009bf (Weak Nonce)


Can you calculate my private key? I want to try whether what you said is true or false.

Again,
Anyone can, since you provided the K (nonce) values. Please do note provide them.
Do provide however 10 signatures in the JSON format, as i said before. make sure the key and nonce are below 230 bits.
If you tell me K it's like you tell me the private key yourself.
newbie
Activity: 12
Merit: 0
Public Key (Hex): 0386747aa730e55346fe6609721350cd84a4f5d22308bcbffc25017c287f1f8b5c

Signature 1:
R1 = 0x471e9702f12cf6872696904e07496589009676aa4720b4c951b2e2253bd1968e
S1 = 0x5934656d4316e4a5b757a7017dde8fb5bf9d040ef9df0d4d8f90cc7d4355a8b2
Z1 = 0xcfa395b2d3a9069352d8a7ba6ea6c673226cb1dc57daddcf8c97000fc5d17256
k1 = 0xee39998957fc2aeaf7a995e16cf8757f9d697ad5 (Weak Nonce)

Signature 2:
R2 = 0xff391701e487807e0135f0b489d06aec6dbb80f726a768281369fa4bb8fa47f5
S2 = 0xb9ff0b62b77c0b3c9a296dba47eabbd2ef404423badc5168796aca550622eb9
Z2 = 0x5d9d720a8bd823ad5a6e37dbe6ffefcbbbbce95da518be3a0452bc1b2e74332a
k2 = 0xea2fdc05cb42d93af1683d4de96f2e18b80009bf (Weak Nonce)


Can you calculate my private key? I want to try whether what you said is true or false.
?
Activity: -
Merit: -
Public Key (Hex): 03e153488f3e6faadec294c30f28b303e07a69040e6a37fecc12dcac33933badfe

Signature 1:
R1 = 0xe2402a7ab9ab808952d215df2d8d6343c1a508400c73d28feace49594ab10eac
S1 = 0xdd5ffdb2cf9954a1de317d25bb21532690536ce7b3e1f1037153cd83df42f62e
Z1 = 0x8055c4701f995b0c59c86e5c8a93706a7ea424035feec9a8641e8e5a763e7a20
k1 = 0x4e078897c8e158cd261ecf65b71f7d60c344db67 (Weak Nonce)

Signature 2:
R2 = 0x52c9ab07c20c0a41cd378f43697d24d8bbb64f5da78ab37c57178a3c6cc84eb5
S2 = 0xbccdc38ff63301cedeb60d03f4af2227f58948dcc1a19a2a15f6a3b5844bf1a0
Z2 = 0xa19d1f3d31d8896ac2626b0f466d0e416ceea61f0f5d935517ab416e08fc9806
k2 = 0x42f760690420321648b533873daa9038dd496066 (Weak Nonce)



Can you calculate my private key? I want to try whether what you said is true or false.

Anyone can, since you provided the K (nonce) values. Please do note provide them.
Do provide however 10 signatures in the JSON format, as i said before. make sure the key and nonce are below 230 bits.
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk

230 bit:

[["0xdce394502671a3472fa7ec41b0ab69963f39482d18f54287b5f366c04c74ce7e", "0x950459a3712bd78d35232a86c301013befb49c5c69db88e777157a6f82eb453c", "0xb9d4daec5a40a0e3d14ce54667dc2ce366369772f5c480e8ba8bde8c7f7c9f1b"], ["0x852bebc37319ba1a0f3bf452b36f67536db30705115943957394090444b9d1c7", "0x8efc83369b5d3c1fd4babb15f86cb72ec2ad335027d5be254a55c22c2922ee0c", "0x10415d67659ef1721de51ca3bb49d2c876069b3da864538f78805c822e3233a8"], ["0xdcfbb9ef5fa6a26abb29aae0a2a41ad8e5e10899b12b387fa3cdffe7e99dc530", "0x9491d52ddee21b79f140edeef94b82352d4bd46edea867cc1745f35e793a965f", "0x6d95d1cc02b662c55cc8dfdf5656f5ab7fc4488805130d7feb4fb6b3fd65ab7"], ["0x854ec7b688feca4735aebcf6d8c281b0b49bd031943de9d7ec4718d10f8ae3bc", "0xeec3dd6b212a5759f3389458d358bb37e6f5303dbf5e384aa386e6d7c84b39c9", "0xf7673185e083db8e54b7a5b83b545747d90fd1c2064fa1091d394d491ede0e45"], ["0xf7f90f3c03bd5c87fe76fefd2d91903faeaeb3119cae109378898c6fd744c00d", "0xf0281f25b1d67bb37740dc54582a275d6f7ecb51d09c7f4ab501f3da84bd75e8", "0xe141e76eb1630ed09f26c5690b5cff366acf73b09449fd532277baf6bd6804ac"], ["0x9d95a2ba18cdb6cf55e6c43696da0b32361f22a6941c3e45be634672d8392b6e", "0x63fbf92440443f326d20c51981b69b509d296d2f64fe198c276f7c77c4e83033", "0x2c74261400e10ce761dcefb1f2ff0b69c91a3afb9ec376bce14885ff901aa14d"], ["0xc3d602e432a47e5b79e7fb5d1d638f35031118f26c3fc1a2b1d2c1b3114f6d75", "0xa0e7fd384990c93802b1ba6fdbcd57da16bbc6c4a883a74e4e149624c5410728", "0xa8bb9b81d623bd16a1908367ae6d43c10c8e14df73d299c4195fb96285b500dc"], ["0xee3ccd41f20240905dec84e7a291e32527b054f2069327e4f1b965e4cad7dd26", "0xba357025970f308b424f3080c5529cb31dc6a030226f1f57b05ffb24c329ea7e", "0x3326ac504b004e16a2a646e3d4adbde07aea27a387ee674c2ed9eadfc4cf5376"], ["0x82022ec18e1f32a443d2f5938681fb9159013fb91f804378d5b96c1649f35dbf", "0xe7605b8db8138314c1c7d6c576d9557ed2a72bce5c9592654d134ff5c9e5d044", "0xf767efe06026b5142be7b80cc149d57606c814c74b65285127eb652c18c9aa0"], ["0xeda2005707df7793446995255c4087f5baa7792a1cbdb95b69a836a27438c888", "0x23c35f861a9726309713144c5f13898140b06905ebe2ecda675edb4ea80e998c", "0x9911c7e2a14c070e652c5d8de355039d9db7afcd33618bb0ba8e7bea37cedf99"]]

pubkey:

04a2e0e99ceac47a3dd83f33434523f09ba8b35b773c795fe1c5a370f1e73456e92fb40ba82f4ec 010bdb0800872656a9e1eef6d1627259850bea1671880c779bc


?


I'm running some unrelated tests now, it'll finish soon and i'll send it. if you can send the x and y of the public key it'll be good.

I made dec for pubkey later and send it.


The private key for the 230 bit public key is
1606810226048941903531730621352970454741442315642201293890991507745196

confirm:

print(0x3b99934a8858ffa79d9a6d7a7f3ba4c82ced80430118adfc885d45a9ac


try 256?

after 256 need check 256 with nonce  <252

after after test or real data


so, time to go to "dark web anonimous" is little fare  away ))

It works on real data as you seen.
I can confirm that i already did that on 256 bit keys and it works.
if you want we can chat privately, i don't want to make things too public on the internet.

ok, I was send you pm now

lets continue test on real data,- nonce
?
Activity: -
Merit: -

230 bit:

[["0xdce394502671a3472fa7ec41b0ab69963f39482d18f54287b5f366c04c74ce7e", "0x950459a3712bd78d35232a86c301013befb49c5c69db88e777157a6f82eb453c", "0xb9d4daec5a40a0e3d14ce54667dc2ce366369772f5c480e8ba8bde8c7f7c9f1b"], ["0x852bebc37319ba1a0f3bf452b36f67536db30705115943957394090444b9d1c7", "0x8efc83369b5d3c1fd4babb15f86cb72ec2ad335027d5be254a55c22c2922ee0c", "0x10415d67659ef1721de51ca3bb49d2c876069b3da864538f78805c822e3233a8"], ["0xdcfbb9ef5fa6a26abb29aae0a2a41ad8e5e10899b12b387fa3cdffe7e99dc530", "0x9491d52ddee21b79f140edeef94b82352d4bd46edea867cc1745f35e793a965f", "0x6d95d1cc02b662c55cc8dfdf5656f5ab7fc4488805130d7feb4fb6b3fd65ab7"], ["0x854ec7b688feca4735aebcf6d8c281b0b49bd031943de9d7ec4718d10f8ae3bc", "0xeec3dd6b212a5759f3389458d358bb37e6f5303dbf5e384aa386e6d7c84b39c9", "0xf7673185e083db8e54b7a5b83b545747d90fd1c2064fa1091d394d491ede0e45"], ["0xf7f90f3c03bd5c87fe76fefd2d91903faeaeb3119cae109378898c6fd744c00d", "0xf0281f25b1d67bb37740dc54582a275d6f7ecb51d09c7f4ab501f3da84bd75e8", "0xe141e76eb1630ed09f26c5690b5cff366acf73b09449fd532277baf6bd6804ac"], ["0x9d95a2ba18cdb6cf55e6c43696da0b32361f22a6941c3e45be634672d8392b6e", "0x63fbf92440443f326d20c51981b69b509d296d2f64fe198c276f7c77c4e83033", "0x2c74261400e10ce761dcefb1f2ff0b69c91a3afb9ec376bce14885ff901aa14d"], ["0xc3d602e432a47e5b79e7fb5d1d638f35031118f26c3fc1a2b1d2c1b3114f6d75", "0xa0e7fd384990c93802b1ba6fdbcd57da16bbc6c4a883a74e4e149624c5410728", "0xa8bb9b81d623bd16a1908367ae6d43c10c8e14df73d299c4195fb96285b500dc"], ["0xee3ccd41f20240905dec84e7a291e32527b054f2069327e4f1b965e4cad7dd26", "0xba357025970f308b424f3080c5529cb31dc6a030226f1f57b05ffb24c329ea7e", "0x3326ac504b004e16a2a646e3d4adbde07aea27a387ee674c2ed9eadfc4cf5376"], ["0x82022ec18e1f32a443d2f5938681fb9159013fb91f804378d5b96c1649f35dbf", "0xe7605b8db8138314c1c7d6c576d9557ed2a72bce5c9592654d134ff5c9e5d044", "0xf767efe06026b5142be7b80cc149d57606c814c74b65285127eb652c18c9aa0"], ["0xeda2005707df7793446995255c4087f5baa7792a1cbdb95b69a836a27438c888", "0x23c35f861a9726309713144c5f13898140b06905ebe2ecda675edb4ea80e998c", "0x9911c7e2a14c070e652c5d8de355039d9db7afcd33618bb0ba8e7bea37cedf99"]]

pubkey:

04a2e0e99ceac47a3dd83f33434523f09ba8b35b773c795fe1c5a370f1e73456e92fb40ba82f4ec 010bdb0800872656a9e1eef6d1627259850bea1671880c779bc


?


I'm running some unrelated tests now, it'll finish soon and i'll send it. if you can send the x and y of the public key it'll be good.

I made dec for pubkey later and send it.


The private key for the 230 bit public key is
1606810226048941903531730621352970454741442315642201293890991507745196

confirm:

print(0x3b99934a8858ffa79d9a6d7a7f3ba4c82ced80430118adfc885d45a9ac


try 256?

after 256 need check 256 with nonce  <252

after after test or real data


so, time to go to "dark web anonimous" is little fare  away ))

It works on real data as you seen.
I can confirm that i already did that on 256 bit keys and it works.
if you want we can chat privately, i don't want to make things too public on the internet.
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk

230 bit:

[["0xdce394502671a3472fa7ec41b0ab69963f39482d18f54287b5f366c04c74ce7e", "0x950459a3712bd78d35232a86c301013befb49c5c69db88e777157a6f82eb453c", "0xb9d4daec5a40a0e3d14ce54667dc2ce366369772f5c480e8ba8bde8c7f7c9f1b"], ["0x852bebc37319ba1a0f3bf452b36f67536db30705115943957394090444b9d1c7", "0x8efc83369b5d3c1fd4babb15f86cb72ec2ad335027d5be254a55c22c2922ee0c", "0x10415d67659ef1721de51ca3bb49d2c876069b3da864538f78805c822e3233a8"], ["0xdcfbb9ef5fa6a26abb29aae0a2a41ad8e5e10899b12b387fa3cdffe7e99dc530", "0x9491d52ddee21b79f140edeef94b82352d4bd46edea867cc1745f35e793a965f", "0x6d95d1cc02b662c55cc8dfdf5656f5ab7fc4488805130d7feb4fb6b3fd65ab7"], ["0x854ec7b688feca4735aebcf6d8c281b0b49bd031943de9d7ec4718d10f8ae3bc", "0xeec3dd6b212a5759f3389458d358bb37e6f5303dbf5e384aa386e6d7c84b39c9", "0xf7673185e083db8e54b7a5b83b545747d90fd1c2064fa1091d394d491ede0e45"], ["0xf7f90f3c03bd5c87fe76fefd2d91903faeaeb3119cae109378898c6fd744c00d", "0xf0281f25b1d67bb37740dc54582a275d6f7ecb51d09c7f4ab501f3da84bd75e8", "0xe141e76eb1630ed09f26c5690b5cff366acf73b09449fd532277baf6bd6804ac"], ["0x9d95a2ba18cdb6cf55e6c43696da0b32361f22a6941c3e45be634672d8392b6e", "0x63fbf92440443f326d20c51981b69b509d296d2f64fe198c276f7c77c4e83033", "0x2c74261400e10ce761dcefb1f2ff0b69c91a3afb9ec376bce14885ff901aa14d"], ["0xc3d602e432a47e5b79e7fb5d1d638f35031118f26c3fc1a2b1d2c1b3114f6d75", "0xa0e7fd384990c93802b1ba6fdbcd57da16bbc6c4a883a74e4e149624c5410728", "0xa8bb9b81d623bd16a1908367ae6d43c10c8e14df73d299c4195fb96285b500dc"], ["0xee3ccd41f20240905dec84e7a291e32527b054f2069327e4f1b965e4cad7dd26", "0xba357025970f308b424f3080c5529cb31dc6a030226f1f57b05ffb24c329ea7e", "0x3326ac504b004e16a2a646e3d4adbde07aea27a387ee674c2ed9eadfc4cf5376"], ["0x82022ec18e1f32a443d2f5938681fb9159013fb91f804378d5b96c1649f35dbf", "0xe7605b8db8138314c1c7d6c576d9557ed2a72bce5c9592654d134ff5c9e5d044", "0xf767efe06026b5142be7b80cc149d57606c814c74b65285127eb652c18c9aa0"], ["0xeda2005707df7793446995255c4087f5baa7792a1cbdb95b69a836a27438c888", "0x23c35f861a9726309713144c5f13898140b06905ebe2ecda675edb4ea80e998c", "0x9911c7e2a14c070e652c5d8de355039d9db7afcd33618bb0ba8e7bea37cedf99"]]

pubkey:

04a2e0e99ceac47a3dd83f33434523f09ba8b35b773c795fe1c5a370f1e73456e92fb40ba82f4ec 010bdb0800872656a9e1eef6d1627259850bea1671880c779bc


?


I'm running some unrelated tests now, it'll finish soon and i'll send it. if you can send the x and y of the public key it'll be good.

I made dec for pubkey later and send it.


The private key for the 230 bit public key is
1606810226048941903531730621352970454741442315642201293890991507745196

confirm:

print(0x3b99934a8858ffa79d9a6d7a7f3ba4c82ced80430118adfc885d45a9ac


try 256?

after 256 need check 256 with nonce  <252

after after test or real data


so, time to go to "dark web anonimous" is little fare  away ))
?
Activity: -
Merit: -

230 bit:

[["0xdce394502671a3472fa7ec41b0ab69963f39482d18f54287b5f366c04c74ce7e", "0x950459a3712bd78d35232a86c301013befb49c5c69db88e777157a6f82eb453c", "0xb9d4daec5a40a0e3d14ce54667dc2ce366369772f5c480e8ba8bde8c7f7c9f1b"], ["0x852bebc37319ba1a0f3bf452b36f67536db30705115943957394090444b9d1c7", "0x8efc83369b5d3c1fd4babb15f86cb72ec2ad335027d5be254a55c22c2922ee0c", "0x10415d67659ef1721de51ca3bb49d2c876069b3da864538f78805c822e3233a8"], ["0xdcfbb9ef5fa6a26abb29aae0a2a41ad8e5e10899b12b387fa3cdffe7e99dc530", "0x9491d52ddee21b79f140edeef94b82352d4bd46edea867cc1745f35e793a965f", "0x6d95d1cc02b662c55cc8dfdf5656f5ab7fc4488805130d7feb4fb6b3fd65ab7"], ["0x854ec7b688feca4735aebcf6d8c281b0b49bd031943de9d7ec4718d10f8ae3bc", "0xeec3dd6b212a5759f3389458d358bb37e6f5303dbf5e384aa386e6d7c84b39c9", "0xf7673185e083db8e54b7a5b83b545747d90fd1c2064fa1091d394d491ede0e45"], ["0xf7f90f3c03bd5c87fe76fefd2d91903faeaeb3119cae109378898c6fd744c00d", "0xf0281f25b1d67bb37740dc54582a275d6f7ecb51d09c7f4ab501f3da84bd75e8", "0xe141e76eb1630ed09f26c5690b5cff366acf73b09449fd532277baf6bd6804ac"], ["0x9d95a2ba18cdb6cf55e6c43696da0b32361f22a6941c3e45be634672d8392b6e", "0x63fbf92440443f326d20c51981b69b509d296d2f64fe198c276f7c77c4e83033", "0x2c74261400e10ce761dcefb1f2ff0b69c91a3afb9ec376bce14885ff901aa14d"], ["0xc3d602e432a47e5b79e7fb5d1d638f35031118f26c3fc1a2b1d2c1b3114f6d75", "0xa0e7fd384990c93802b1ba6fdbcd57da16bbc6c4a883a74e4e149624c5410728", "0xa8bb9b81d623bd16a1908367ae6d43c10c8e14df73d299c4195fb96285b500dc"], ["0xee3ccd41f20240905dec84e7a291e32527b054f2069327e4f1b965e4cad7dd26", "0xba357025970f308b424f3080c5529cb31dc6a030226f1f57b05ffb24c329ea7e", "0x3326ac504b004e16a2a646e3d4adbde07aea27a387ee674c2ed9eadfc4cf5376"], ["0x82022ec18e1f32a443d2f5938681fb9159013fb91f804378d5b96c1649f35dbf", "0xe7605b8db8138314c1c7d6c576d9557ed2a72bce5c9592654d134ff5c9e5d044", "0xf767efe06026b5142be7b80cc149d57606c814c74b65285127eb652c18c9aa0"], ["0xeda2005707df7793446995255c4087f5baa7792a1cbdb95b69a836a27438c888", "0x23c35f861a9726309713144c5f13898140b06905ebe2ecda675edb4ea80e998c", "0x9911c7e2a14c070e652c5d8de355039d9db7afcd33618bb0ba8e7bea37cedf99"]]

pubkey:

04a2e0e99ceac47a3dd83f33434523f09ba8b35b773c795fe1c5a370f1e73456e92fb40ba82f4ec 010bdb0800872656a9e1eef6d1627259850bea1671880c779bc


?


I'm running some unrelated tests now, it'll finish soon and i'll send it. if you can send the x and y of the public key it'll be good.

I made dec for pubkey later and send it.


The private key for the 230 bit public key is
1606810226048941903531730621352970454741442315642201293890991507745196
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk

230 bit:

[["0xdce394502671a3472fa7ec41b0ab69963f39482d18f54287b5f366c04c74ce7e", "0x950459a3712bd78d35232a86c301013befb49c5c69db88e777157a6f82eb453c", "0xb9d4daec5a40a0e3d14ce54667dc2ce366369772f5c480e8ba8bde8c7f7c9f1b"], ["0x852bebc37319ba1a0f3bf452b36f67536db30705115943957394090444b9d1c7", "0x8efc83369b5d3c1fd4babb15f86cb72ec2ad335027d5be254a55c22c2922ee0c", "0x10415d67659ef1721de51ca3bb49d2c876069b3da864538f78805c822e3233a8"], ["0xdcfbb9ef5fa6a26abb29aae0a2a41ad8e5e10899b12b387fa3cdffe7e99dc530", "0x9491d52ddee21b79f140edeef94b82352d4bd46edea867cc1745f35e793a965f", "0x6d95d1cc02b662c55cc8dfdf5656f5ab7fc4488805130d7feb4fb6b3fd65ab7"], ["0x854ec7b688feca4735aebcf6d8c281b0b49bd031943de9d7ec4718d10f8ae3bc", "0xeec3dd6b212a5759f3389458d358bb37e6f5303dbf5e384aa386e6d7c84b39c9", "0xf7673185e083db8e54b7a5b83b545747d90fd1c2064fa1091d394d491ede0e45"], ["0xf7f90f3c03bd5c87fe76fefd2d91903faeaeb3119cae109378898c6fd744c00d", "0xf0281f25b1d67bb37740dc54582a275d6f7ecb51d09c7f4ab501f3da84bd75e8", "0xe141e76eb1630ed09f26c5690b5cff366acf73b09449fd532277baf6bd6804ac"], ["0x9d95a2ba18cdb6cf55e6c43696da0b32361f22a6941c3e45be634672d8392b6e", "0x63fbf92440443f326d20c51981b69b509d296d2f64fe198c276f7c77c4e83033", "0x2c74261400e10ce761dcefb1f2ff0b69c91a3afb9ec376bce14885ff901aa14d"], ["0xc3d602e432a47e5b79e7fb5d1d638f35031118f26c3fc1a2b1d2c1b3114f6d75", "0xa0e7fd384990c93802b1ba6fdbcd57da16bbc6c4a883a74e4e149624c5410728", "0xa8bb9b81d623bd16a1908367ae6d43c10c8e14df73d299c4195fb96285b500dc"], ["0xee3ccd41f20240905dec84e7a291e32527b054f2069327e4f1b965e4cad7dd26", "0xba357025970f308b424f3080c5529cb31dc6a030226f1f57b05ffb24c329ea7e", "0x3326ac504b004e16a2a646e3d4adbde07aea27a387ee674c2ed9eadfc4cf5376"], ["0x82022ec18e1f32a443d2f5938681fb9159013fb91f804378d5b96c1649f35dbf", "0xe7605b8db8138314c1c7d6c576d9557ed2a72bce5c9592654d134ff5c9e5d044", "0xf767efe06026b5142be7b80cc149d57606c814c74b65285127eb652c18c9aa0"], ["0xeda2005707df7793446995255c4087f5baa7792a1cbdb95b69a836a27438c888", "0x23c35f861a9726309713144c5f13898140b06905ebe2ecda675edb4ea80e998c", "0x9911c7e2a14c070e652c5d8de355039d9db7afcd33618bb0ba8e7bea37cedf99"]]

pubkey:

04a2e0e99ceac47a3dd83f33434523f09ba8b35b773c795fe1c5a370f1e73456e92fb40ba82f4ec 010bdb0800872656a9e1eef6d1627259850bea1671880c779bc


?


I'm running some unrelated tests now, it'll finish soon and i'll send it. if you can send the x and y of the public key it'll be good.

I made dec for pubkey later and send it.
?
Activity: -
Merit: -

230 bit:

[["0xdce394502671a3472fa7ec41b0ab69963f39482d18f54287b5f366c04c74ce7e", "0x950459a3712bd78d35232a86c301013befb49c5c69db88e777157a6f82eb453c", "0xb9d4daec5a40a0e3d14ce54667dc2ce366369772f5c480e8ba8bde8c7f7c9f1b"], ["0x852bebc37319ba1a0f3bf452b36f67536db30705115943957394090444b9d1c7", "0x8efc83369b5d3c1fd4babb15f86cb72ec2ad335027d5be254a55c22c2922ee0c", "0x10415d67659ef1721de51ca3bb49d2c876069b3da864538f78805c822e3233a8"], ["0xdcfbb9ef5fa6a26abb29aae0a2a41ad8e5e10899b12b387fa3cdffe7e99dc530", "0x9491d52ddee21b79f140edeef94b82352d4bd46edea867cc1745f35e793a965f", "0x6d95d1cc02b662c55cc8dfdf5656f5ab7fc4488805130d7feb4fb6b3fd65ab7"], ["0x854ec7b688feca4735aebcf6d8c281b0b49bd031943de9d7ec4718d10f8ae3bc", "0xeec3dd6b212a5759f3389458d358bb37e6f5303dbf5e384aa386e6d7c84b39c9", "0xf7673185e083db8e54b7a5b83b545747d90fd1c2064fa1091d394d491ede0e45"], ["0xf7f90f3c03bd5c87fe76fefd2d91903faeaeb3119cae109378898c6fd744c00d", "0xf0281f25b1d67bb37740dc54582a275d6f7ecb51d09c7f4ab501f3da84bd75e8", "0xe141e76eb1630ed09f26c5690b5cff366acf73b09449fd532277baf6bd6804ac"], ["0x9d95a2ba18cdb6cf55e6c43696da0b32361f22a6941c3e45be634672d8392b6e", "0x63fbf92440443f326d20c51981b69b509d296d2f64fe198c276f7c77c4e83033", "0x2c74261400e10ce761dcefb1f2ff0b69c91a3afb9ec376bce14885ff901aa14d"], ["0xc3d602e432a47e5b79e7fb5d1d638f35031118f26c3fc1a2b1d2c1b3114f6d75", "0xa0e7fd384990c93802b1ba6fdbcd57da16bbc6c4a883a74e4e149624c5410728", "0xa8bb9b81d623bd16a1908367ae6d43c10c8e14df73d299c4195fb96285b500dc"], ["0xee3ccd41f20240905dec84e7a291e32527b054f2069327e4f1b965e4cad7dd26", "0xba357025970f308b424f3080c5529cb31dc6a030226f1f57b05ffb24c329ea7e", "0x3326ac504b004e16a2a646e3d4adbde07aea27a387ee674c2ed9eadfc4cf5376"], ["0x82022ec18e1f32a443d2f5938681fb9159013fb91f804378d5b96c1649f35dbf", "0xe7605b8db8138314c1c7d6c576d9557ed2a72bce5c9592654d134ff5c9e5d044", "0xf767efe06026b5142be7b80cc149d57606c814c74b65285127eb652c18c9aa0"], ["0xeda2005707df7793446995255c4087f5baa7792a1cbdb95b69a836a27438c888", "0x23c35f861a9726309713144c5f13898140b06905ebe2ecda675edb4ea80e998c", "0x9911c7e2a14c070e652c5d8de355039d9db7afcd33618bb0ba8e7bea37cedf99"]]

pubkey:

04a2e0e99ceac47a3dd83f33434523f09ba8b35b773c795fe1c5a370f1e73456e92fb40ba82f4ec 010bdb0800872656a9e1eef6d1627259850bea1671880c779bc


?


I'm running some unrelated tests now, it'll finish soon and i'll send it. if you can send the x and y of the public key it'll be good.
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk

230 bit:

[["0xdce394502671a3472fa7ec41b0ab69963f39482d18f54287b5f366c04c74ce7e", "0x950459a3712bd78d35232a86c301013befb49c5c69db88e777157a6f82eb453c", "0xb9d4daec5a40a0e3d14ce54667dc2ce366369772f5c480e8ba8bde8c7f7c9f1b"], ["0x852bebc37319ba1a0f3bf452b36f67536db30705115943957394090444b9d1c7", "0x8efc83369b5d3c1fd4babb15f86cb72ec2ad335027d5be254a55c22c2922ee0c", "0x10415d67659ef1721de51ca3bb49d2c876069b3da864538f78805c822e3233a8"], ["0xdcfbb9ef5fa6a26abb29aae0a2a41ad8e5e10899b12b387fa3cdffe7e99dc530", "0x9491d52ddee21b79f140edeef94b82352d4bd46edea867cc1745f35e793a965f", "0x6d95d1cc02b662c55cc8dfdf5656f5ab7fc4488805130d7feb4fb6b3fd65ab7"], ["0x854ec7b688feca4735aebcf6d8c281b0b49bd031943de9d7ec4718d10f8ae3bc", "0xeec3dd6b212a5759f3389458d358bb37e6f5303dbf5e384aa386e6d7c84b39c9", "0xf7673185e083db8e54b7a5b83b545747d90fd1c2064fa1091d394d491ede0e45"], ["0xf7f90f3c03bd5c87fe76fefd2d91903faeaeb3119cae109378898c6fd744c00d", "0xf0281f25b1d67bb37740dc54582a275d6f7ecb51d09c7f4ab501f3da84bd75e8", "0xe141e76eb1630ed09f26c5690b5cff366acf73b09449fd532277baf6bd6804ac"], ["0x9d95a2ba18cdb6cf55e6c43696da0b32361f22a6941c3e45be634672d8392b6e", "0x63fbf92440443f326d20c51981b69b509d296d2f64fe198c276f7c77c4e83033", "0x2c74261400e10ce761dcefb1f2ff0b69c91a3afb9ec376bce14885ff901aa14d"], ["0xc3d602e432a47e5b79e7fb5d1d638f35031118f26c3fc1a2b1d2c1b3114f6d75", "0xa0e7fd384990c93802b1ba6fdbcd57da16bbc6c4a883a74e4e149624c5410728", "0xa8bb9b81d623bd16a1908367ae6d43c10c8e14df73d299c4195fb96285b500dc"], ["0xee3ccd41f20240905dec84e7a291e32527b054f2069327e4f1b965e4cad7dd26", "0xba357025970f308b424f3080c5529cb31dc6a030226f1f57b05ffb24c329ea7e", "0x3326ac504b004e16a2a646e3d4adbde07aea27a387ee674c2ed9eadfc4cf5376"], ["0x82022ec18e1f32a443d2f5938681fb9159013fb91f804378d5b96c1649f35dbf", "0xe7605b8db8138314c1c7d6c576d9557ed2a72bce5c9592654d134ff5c9e5d044", "0xf767efe06026b5142be7b80cc149d57606c814c74b65285127eb652c18c9aa0"], ["0xeda2005707df7793446995255c4087f5baa7792a1cbdb95b69a836a27438c888", "0x23c35f861a9726309713144c5f13898140b06905ebe2ecda675edb4ea80e998c", "0x9911c7e2a14c070e652c5d8de355039d9db7afcd33618bb0ba8e7bea37cedf99"]]

pubkey:

04a2e0e99ceac47a3dd83f33434523f09ba8b35b773c795fe1c5a370f1e73456e92fb40ba82f4ec 010bdb0800872656a9e1eef6d1627259850bea1671880c779bc


?
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
@

use my data, your scrypt no so thrust  Wink

Ok your data

but you notice you sent the private key in your message ? Smiley

Please send in this format:
x, y, like:
Public Key (X, Y): (44202319390410420620174372532372875185953197251644945304413392539090574952603, 79625797881515903493300597677363046016591315712355452263855867713713150175555)
Z R S, like:
[["0xebad8956b69c518736f2da8c1797ebbeea7f59a6397927d72f0f120763b33beb", "0x5cb8a722d3847aa6dce8a43d7294f1f9611e3a046c2055bc19f72bc61213b04a", "0x7703f295533cabff5d63dceab503d225a92dafa4c323a8c531e845d3a340499d"], ["0xb9fe01e315739e58f5a85ae30635ddf1c45b974cd75df3a39be644beaa3ff535", "0xd5fd9ee0b2ac6743e3db8ba5d8ec85a4976f437007b2b5a050b3e8065ebbabe5", "0x7405c876d8ad3c1399a93520c2f030c4791f5460830ff5e95a641d06018566c8"]]


For me hard modify my scrypt

255 bit, Your scrypt generate, in file:


http://files.reol.com/zrQaR/sigs.json


priv ?)

1. I need to know the public key
2. I don't do 255 bit public testing. do upto 200 bits.


200 bit not interesting  Cry  


pubkey for 256, make 256 break ? )

046315ed4850275ab5343520903379e60816f6fb4d40f27c8dd60b8b2c1e1c5d04e85fb5e3a6526 fdde7a43f5390749d6362e87e94b5aa0522ff66ae6f132fb32a

Let's do 230 bits. send in the correct format:
Public Key (X, Y): (111468681475529474618384988514982943722180905395931221478822535863368953066428, 93862227888075246266810335794316357123008982642524834499972339699181455084137)


and also sigs.json file.

Sorry, cant pubkey in dec Im from phone, this is 200 bit:


04e6f2c27456fda47b3f142320c4518e49c64fe6d8a723a604b8f267de0e3614cab9a94a8002197 5049a5e4da6c5a2df54866598c4563718d3de0a9e5f3bb1af68


[["0x862039984a76dd9297a99bc0276aa292524ddd53d98fb7a8ea8088fa4742d457", "0x563e55664d311c8ceb807c7408919220330cc884e36b2d49b6fb8cacd52c2f4c", "0x8b0960bc8c60963f91e634bdf707282bdab2c4823fd966b114f5fba19f4cb3a1"], ["0xb2aed8ef4034d10e234bc3cdef7a95e453d38fcefcbd1018d7e38c5109851077", "0xfd8891dced1ccb32e1a80d4f69d969798cc4caeb5c1cc35b5ee8f501103f4a48", "0x9dd233f17c1c8ece73b963006b70282370fcce90e2b9221569374948dfebeaf0"], ["0xbcc42f59e549524b8555631842f88fb7a02c6e766c6716d075c95678298a2aa0", "0x1c762dd217e7b0524e438d844f98fbba808e6a3981e38c9f288cbb18e1555337", "0x7c1bfb56ee2c1742b5c53e2be9ef68fefef639c0bdd009233e579d0c081ff82d"], ["0xe05483c222e1b694a73752cdaeefd338744b39cdacbd93ffc0c1c10b7f061f6a", "0xf9a7fb3a3986b7c696bb00d989234b379568a1846cf5058203a1d5dd1c3e29c4", "0x367f06646b270e868bd6376e472acae4c62959526886df71d3a8572642f559fc"], ["0xfecf7509ad7d5bfb64d7c1deb3e97903ab2437953ccd6d7e8aa0b6994e5759cb", "0x310d56f00e7c246910be506508ec682278f76a9533a4649f621722cd38788e1a", "0xf2f8d6d00a3917fb3e7534b4f29c1021b6b50d4467d2f612f6712258eee89397"], ["0xefcfa04d4b33279066caa8c6ac5f4fcc0bdf6beae0f2b9314e0578fc9ab3e24c", "0xcc3b50cfdd35d2112e1c85999ffabd65eb2e4d5dbeb7bc3c39466c9a0ecbb8af", "0x83729c0edbb7e20eaf55e92c207d3a70debab97a67184cb5becc334a28645137"], ["0xc99f9032006d4a0f8a2a9a556805ba99c534d3c80427acd11e9c3ae73b253fd4", "0xf7cd7c92f448777ee739f1569b9953d931f025f244b2143194d400aa393d1d18", "0x877ffeaac3884312f936556ed2f1068053dbc57ab78027c250ebe90f8af34ac0"], ["0xbcb731c55d64eb19a9535c97ebe2faeffbdf149c30f07dda681d79f5986f3a39", "0x397103de8d03f2a79273e19e35c213ed5af82f69c0c83bf64269a93d9d9196fb", "0x7e403127fddda52a7e5d2466c077e7c4f4b982593c1378d64d539652f2ca4ef0"], ["0xfe775d67b4d9fa258439f3eeb0b676cff119c9b3704b5f2fb2ca65fc4fcf943d", "0x30cbdd1016751e5394ba6ab8909e149caebd0a35c4d8959c9a4ca23904198b3f", "0x563e0b92de362675e79d72dc8693dbf21b7e1813cac4943e9b4e70b8ebab5831"], ["0xd59ba219b91f6160898385b16d44dfaad7040454cb4e2d8c7812b68026d021e0", "0xf5db5836d7fb48eede438ecb8ae996ff249f7c7ffa455d830d69822d8d5c63ad", "0xf7dbcdf666cf640046a5133e1c01edb3282763b976439981e13c756c2bf4eb28"]]

?
Activity: -
Merit: -
@

use my data, your scrypt no so thrust  Wink

Ok your data

but you notice you sent the private key in your message ? Smiley

Please send in this format:
x, y, like:
Public Key (X, Y): (44202319390410420620174372532372875185953197251644945304413392539090574952603, 79625797881515903493300597677363046016591315712355452263855867713713150175555)
Z R S, like:
[["0xebad8956b69c518736f2da8c1797ebbeea7f59a6397927d72f0f120763b33beb", "0x5cb8a722d3847aa6dce8a43d7294f1f9611e3a046c2055bc19f72bc61213b04a", "0x7703f295533cabff5d63dceab503d225a92dafa4c323a8c531e845d3a340499d"], ["0xb9fe01e315739e58f5a85ae30635ddf1c45b974cd75df3a39be644beaa3ff535", "0xd5fd9ee0b2ac6743e3db8ba5d8ec85a4976f437007b2b5a050b3e8065ebbabe5", "0x7405c876d8ad3c1399a93520c2f030c4791f5460830ff5e95a641d06018566c8"]]


For me hard modify my scrypt

255 bit, Your scrypt generate, in file:


http://files.reol.com/zrQaR/sigs.json


priv ?)

1. I need to know the public key
2. I don't do 255 bit public testing. do upto 200 bits.


200 bit not interesting  Cry  


pubkey for 256, make 256 break ? )

046315ed4850275ab5343520903379e60816f6fb4d40f27c8dd60b8b2c1e1c5d04e85fb5e3a6526 fdde7a43f5390749d6362e87e94b5aa0522ff66ae6f132fb32a

Let's do 230 bits. send in the correct format:
Public Key (X, Y): (111468681475529474618384988514982943722180905395931221478822535863368953066428, 93862227888075246266810335794316357123008982642524834499972339699181455084137)


and also sigs.json file.
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
@

use my data, your scrypt no so thrust  Wink

Ok your data

but you notice you sent the private key in your message ? Smiley

Please send in this format:
x, y, like:
Public Key (X, Y): (44202319390410420620174372532372875185953197251644945304413392539090574952603, 79625797881515903493300597677363046016591315712355452263855867713713150175555)
Z R S, like:
[["0xebad8956b69c518736f2da8c1797ebbeea7f59a6397927d72f0f120763b33beb", "0x5cb8a722d3847aa6dce8a43d7294f1f9611e3a046c2055bc19f72bc61213b04a", "0x7703f295533cabff5d63dceab503d225a92dafa4c323a8c531e845d3a340499d"], ["0xb9fe01e315739e58f5a85ae30635ddf1c45b974cd75df3a39be644beaa3ff535", "0xd5fd9ee0b2ac6743e3db8ba5d8ec85a4976f437007b2b5a050b3e8065ebbabe5", "0x7405c876d8ad3c1399a93520c2f030c4791f5460830ff5e95a641d06018566c8"]]


For me hard modify my scrypt

255 bit, Your scrypt generate, in file:


http://files.reol.com/zrQaR/sigs.json


priv ?)

1. I need to know the public key
2. I don't do 255 bit public testing. do upto 200 bits.


200 bit not interesting  because no  real priv and nonce 200 bit Cry  


pubkey for 256, make 256 break ? )

046315ed4850275ab5343520903379e60816f6fb4d40f27c8dd60b8b2c1e1c5d04e85fb5e3a6526 fdde7a43f5390749d6362e87e94b5aa0522ff66ae6f132fb32a
?
Activity: -
Merit: -
@

use my data, your scrypt no so thrust  Wink

Ok your data

but you notice you sent the private key in your message ? Smiley

Please send in this format:
x, y, like:
Public Key (X, Y): (44202319390410420620174372532372875185953197251644945304413392539090574952603, 79625797881515903493300597677363046016591315712355452263855867713713150175555)
Z R S, like:
[["0xebad8956b69c518736f2da8c1797ebbeea7f59a6397927d72f0f120763b33beb", "0x5cb8a722d3847aa6dce8a43d7294f1f9611e3a046c2055bc19f72bc61213b04a", "0x7703f295533cabff5d63dceab503d225a92dafa4c323a8c531e845d3a340499d"], ["0xb9fe01e315739e58f5a85ae30635ddf1c45b974cd75df3a39be644beaa3ff535", "0xd5fd9ee0b2ac6743e3db8ba5d8ec85a4976f437007b2b5a050b3e8065ebbabe5", "0x7405c876d8ad3c1399a93520c2f030c4791f5460830ff5e95a641d06018566c8"]]


For me hard modify my scrypt

255 bit, Your scrypt generate, in file:


http://files.reol.com/zrQaR/sigs.json


priv ?)

1. I need to know the public key
2. I don't do 255 bit public testing. do upto 200 bits.
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
@

use my data, your scrypt no so thrust  Wink

Ok your data

but you notice you sent the private key in your message ? Smiley

Please send in this format:
x, y, like:
Public Key (X, Y): (44202319390410420620174372532372875185953197251644945304413392539090574952603, 79625797881515903493300597677363046016591315712355452263855867713713150175555)
Z R S, like:
[["0xebad8956b69c518736f2da8c1797ebbeea7f59a6397927d72f0f120763b33beb", "0x5cb8a722d3847aa6dce8a43d7294f1f9611e3a046c2055bc19f72bc61213b04a", "0x7703f295533cabff5d63dceab503d225a92dafa4c323a8c531e845d3a340499d"], ["0xb9fe01e315739e58f5a85ae30635ddf1c45b974cd75df3a39be644beaa3ff535", "0xd5fd9ee0b2ac6743e3db8ba5d8ec85a4976f437007b2b5a050b3e8065ebbabe5", "0x7405c876d8ad3c1399a93520c2f030c4791f5460830ff5e95a641d06018566c8"]]


For me hard modify my scrypt

255 bit, Your scrypt generate, in file:


http://files.reol.com/zrQaR/sigs.json


priv ?)

ps keep in mind, r, always  less then 256 bit, some people  tall what because it lattice not work...
?
Activity: -
Merit: -
@

use my data, your scrypt no so thrust  Wink

Ok your data

but you notice you sent the private key in your message ? Smiley

Please send in this format:
x, y, like:
Public Key (X, Y): (44202319390410420620174372532372875185953197251644945304413392539090574952603, 79625797881515903493300597677363046016591315712355452263855867713713150175555)
Z R S, like:
[["0xebad8956b69c518736f2da8c1797ebbeea7f59a6397927d72f0f120763b33beb", "0x5cb8a722d3847aa6dce8a43d7294f1f9611e3a046c2055bc19f72bc61213b04a", "0x7703f295533cabff5d63dceab503d225a92dafa4c323a8c531e845d3a340499d"], ["0xb9fe01e315739e58f5a85ae30635ddf1c45b974cd75df3a39be644beaa3ff535", "0xd5fd9ee0b2ac6743e3db8ba5d8ec85a4976f437007b2b5a050b3e8065ebbabe5", "0x7405c876d8ad3c1399a93520c2f030c4791f5460830ff5e95a641d06018566c8"]]
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
@

use my data, your scrypt no so thrust  Wink
?
Activity: -
Merit: -
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
@bitcoinend

troble with latticce, lattice cant break 256 bit nonce, many adresses Has no 100 rsz for ex.You scrypt need 10 rsz,- this is more good tgen my scrypt.

If you breack 254...256 it will be good, but I thin no lack will be


I don't use lattice methods, i use some other method i invented.
you are correct with lattice you can't do much.

Oik, I was send you ZRS examples
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Less 200 bit

Privkey ?

04a885c374a9ca2110f2a92e157cf56e522be3e2a772c37b60324907dd527e6c4afac800ecc2d33 eab45f728cf18b1dcc3dba18cbd031d2fea5d52e21144c43292

tra1= 1
r1= 41565872560242209245985630894953722539561019830771503409380069854642835139660
s1= 46167697913957461218506289444898918867418909747391962463833839991148694956615
z1= 104630186537044373229025543623925248392869011065872824899506355123392418664701

tra2= 2
r2= 40362905993303186892727576539120639590744872013468303189628119988875367021363
s2= 8918722928905970064019264461524104329899290051689410020759449205555926090846
z2= 86561738864438169859743216050244971638199755679352424617453518227764854275113

tra3= 3
r3= 25227009836206853146066274158995906067712252382952926847011580079258124051832
s3= 34766875462834686582192424889565682581131461857777419964587416512193135751074
z3= 79817306508913719907099177483547750005702911789948641880602644303065989235492

tra4= 4
r4= 92325727640773617583665427532142197558187923462544104678534862941082044556363
s4= 6224825729540931937933016415048916941423257399800081331408045994527285680767
z4= 93564540381315851155740874541338221942691911675712683316763897837468622327895

tra5= 5
r5= 46916155570972263119747789707938016004455678383376661626938318859647059992150
s5= 2808362462509154258392538920672366275518138305921285538304236691475907042430
z5= 83121620153025663653557679187572740023547956092150547189743265650337381719770

tra6= 6
r6= 18788833082689876886873942688021588118985177937169687678186798540956890596666
s6= 47325451885674650638380694110263291739762382536813151360268597457383529515904
z6= 63738954508955662102576897079741747740230419508766910869430371794438560474393

tra7= 7
r7= 100558611642189173736372820835356695971474030835791215864780532245248298365754
s7= 26992763885730387324497330918603620565202144731990083288777969805508169695393
z7= 107193087403238094588484826690859188257189441020030141970982589419616226516519

tra8= 8
r8= 69869454531635138646430925605841610643991817049631568327802228880787552111940
s8= 57174573365292191562615510040027347778730170398218235301567310336970393777831
z8= 86889567024107712348112710302279565188522186171025854881914278304158234543020

tra9= 9
r9= 43519824599340269147253843009083347138048449020628507011935485144030943054517
s9= 13950835696820418627108689331594903696313300128609714200714201522342528896190
z9= 94459838706412646173836133190673074282437309201032512475270278267668073359602

tra10= 10
r10= 51937535325749168464222246901531970828610328082176905606299178472536193592216
s10= 17372938005414886861848607684580152299106919007920620976958383962893434286138
z10= 72554995752777389041443022964620966289026088653876662165578241695947492124816

tra11= 11
r11= 6679412811491885742270192144071612338943160719456195832987770587038974860343
s11= 28035223868011527961703107804390138460583125110704185041700240637502073744749
z11= 80858732891232320209019113764356900563178711207586056440455349937830353905891

tra12= 12
r12= 71000344179394965717395675695365935217390364725397883744880045853892212498468
s12= 44559501722759847437941978962068979005852110069368763518464494924041194777762
z12= 90833343858703398875072762318592084896556979787024585621481496490332657661325

tra13= 13
r13= 89978542637620994841824602159581860020850115657321405741328015919862127955794
s13= 31290605786259389756164219548170242713722284011122478144583578763906814753787
z13= 94566315297045507031928222366843785786800050163879484995242019162132074454178

tra14= 14
r14= 20678172651371024148903149169662813509131536884666466460008627370286131475739
s14= 35967090006983255349545393352990493603204929038212942628795116684901414860055
z14= 95980320197558816883220935740232660832998252884852342503720971297117572024203

14 RSZ SAVED IN OUTPUT FILE

[Program finished]

your private key is 17667188011415688292006461

Yes prob is right, try another one:

little bit less 200 bit


04d065447b43b466c918335a5e4872efb5c77825aa5253784c33e3c6b6208c575cfa6340a5866ee 7324ffd4709f8ffb89e3c7fb7f616641ed85c737ca4cd69d80e

tra1= 1
r1= 35781056790654206361636626106532587187001414253679897837887838156475723466668
s1= 6420483661399729901071896193492157113485221530257654649758159620805313613799
z1= 100547791275647556398004216387559085805536951048167777884880996562228107084543

tra2= 2
r2= 73941488516126000796052657471876964190587110358439694629074501102022442106431
s2= 56598608452060255983088408972484035241154438153411513200294533230103261078097
z2= 63995063473560138781054408796374718094944556560947394457490921322289893158511

tra3= 3
r3= 1886384249350604282445977799790732413262893800649925232864942917722896591913
s3= 18948812640424305919439971361881005545112811587533619572845580193644176261363
z3= 102563150449971251059219801524954925615383373005226869323672394588175077321751

tra4= 4
r4= 36945364969169061704191115706500123314114008357653438136827080483772991167615
s4= 49106715924334893265546835118393792174316593830813027016490803089436103398052
z4= 70034016739470279793714855528952349918788831631152513270024650215551741471627

tra5= 5
r5= 91585757637746210331660349293789270118038759826152485403274549511906278323143
s5= 3097380967576664827495120296388397518247628453757190562676448135201836131854
z5= 66004996063908293410916212480096343228691085405136523677902709077908982160373

tra6= 6
r6= 100025893124081125891441242917061158948888745006344470411710718254021411619130
s6= 16099749656802874644818974287264644228888171432792163203577233666517235743109
z6= 87806900907564738397549610717773453177076449571783531109586605129269711167428

tra7= 7
r7= 8039716606820365938099904307893390067763291558116635494688608982298157842181
s7= 5091661312087060987187659976856511351732753252666848778115499995279239640811
z7= 75164557710878619072922020899702711526546027856036524447007198503963339749739

tra8= 8
r8= 102324203246603908807363456747628488714439305933981021093819405980483489349666
s8= 14446387861770368683427544757635650778693535978495755458995760826016925065782
z8= 61323027374152455674257148071709377842853643332899883770546261631226880337431

tra9= 9
r9= 52759726271775744856957135612527423299411333468564654090438178051981085882860
s9= 1027972243996974591111638168650284633586382718032866234046069461801784387151
z9= 70507009100503426475242745687606059486536074648509521251195691825697780454968

tra10= 10
r10= 59734964257338792796604981981071829993152131038018988108563957979537513963982
s10= 28368794004434313689095067308979565277712183029661494027471135718667797459755
z10= 105326900337310388649051558330024517737048592594255547884173151326797798704154

10 RSZ SAVED IN OUTPUT FILE



04d065447b43b466c918335a5e4872efb5c77825aa5253784c33e3c6b6208c575cfa6340a5866ee 7324ffd4709f8ffb89e3c7fb7f616641ed85c737ca4cd69d80e


can you try 256 bit with any rsz(i can generate 3000 rsz for ex) ?

I can, can you send the x and y of the public key and the signatures in the following format? too tired to do it manually lol

format of signattues:
[["0xf85f89c1e8197ffe881c7c52839e9726877b86e25805d860470e4501eaef9d0e", "0x82b15151ffb3c99d3eb6d7b5511c4ba6744fae2aa34f664f95d9cacb4ace127c", "0x99b052f6c3ced91f0e08c1137ae3a78bce0e099f9c3d8882c23a91e56ddc2ebd"], ["0xbe8e0599cf99a41e455331b845ed3512b6c347724bdc017f7a43c584f86bfa08", "0x67c3fd2d6d7ab141609c0f524ba41af22d89ee23d462393b015417965c699587", "0xa58e97eed0b4efd03f06f07aea523d667202705bac077c0cb04eedce1260e12e"]]

in this example we have two signatures.
the first item is the hashed message, then the r value and then the s value.



200 biit:

04bf9d48ed926786533a3e4406c2639f3e4f7395ffc684b60ba7f7e3328cec8704e26f47ad27fc8 02d1668b3d7afb6aa058e15f6e519d6e998ba1b9b0e4c829431

format:
    z,
    r,
    s

Calculating RSZ Pairs for Priv 1082037030620137694935887363784713808135323563964855647364244

tra1= 1
0xfd0437f750625331b8ee9828afa67c38cd74fd0bb1334080976e7378f2d39fd2
0x1d9bfe3ce71e75ffa112cbfc72221fadf686f0df07a649864e93bc83205717ee
0x4da6f7e07289eceb0520363c3ee2edcb2cfc8a13def28b699415536d73272f79

tra2= 2
0x8774bc0ee5dab55ad91d8b809e1eaf057f84683f3b23bd096efd35374f1fec31
0xa115f9ce0d7bf0fd0fbe14e70a057afb942d552ed7f9b47ecec01472817699c
0x190cb6bb790f48ab5001760ea38e57a95bb79395886992611d5c62119df94110

tra3= 3
0xd548c8381541804a368a1cc76e40d0f2e2c196e68dfd957c80ce25d54473177f
0xb4882200e159d90530c1d937c347e21e9862528291e7d83dbd7d2fd109ef90aa
0x24d77b7b6def60684e9377d922f6b20b8fa1df62b26d01f315b946c974b828b3

tra4= 4
0xb3c4e0ac29c05eb842bdbe41b781bc3c16103fe119e28b08c76cb67bb72898cb
0x615913a9902c0324a21efcbc26cb905a90cbffecf109b5c00d4150e39187f734
0x71cab408b3a92c7d41e99b4733454779d33e51bd3913902149845944d8617a46

tra5= 5
0x8981c19f4d66657e0495593eeec004d8aa527beb96da2ae6036a5caa55b2d686
0xe3dc5a7bedae878024272850764bc34664a32e6eafb84f29a0c9c4fbda5a2853
0x48a5cb5eb3746310cdcd1d87ac0140a878a167212a5bbd6f23f51fa5063c13ab

tra6= 6
0xc67ce5cf0a3b484bd6a3c3a190051064ba5cafa1437b50108ae2b29a8c4398f8
0x46cb11d9384e5f734380f4c5c92585392440bce5b9961c6d5e54eb62188ed9bf
0x788e203284ef95be421ec8ee32d4ceaa833a42e5b3a833dde2ac3883472f9b31

tra7= 7
0x91a7038e58bacdd8c9e55493fee5a3d2dc9c838ddc48fd0c4ee449d3dda0211b
0x256bfc7de321117b526a971f30ee93a9f73daf8a42b9010083c02fb69fedfc31
0x25953cb5bc16c0bb237d426fd1be75dae8dc507387c3acc9a8924dd574057164

tra8= 8
0xc2f1be8e35b0d4f3da949f148976d0bc675a77261b5c6c7ce99d2eea48f6cc66
0xbfd629222f06ded33ee472d5a379518acfc4a500d747e519c13bdc2bd0552b24
0x6e6276949ed6f8b37bd0d4be81cb3bb7405dde26bc80c36eca620d07a15f7d7b

tra9= 9
0xd1cd886f0d10380aa27bd1ea2b311fc4beaea241d7bfe5bb2e673c7c5c0f7d1e
0x8365822ee2d706fc5bc4d36565767bad8138834587ff039ffb027abb726c47e5
0x65530470d4fbadb17d4759ad814b3bd888a8c4593794029f53ebed9bbd4f1dfb

tra10= 10
0xb7e7e106a1fa7e8fae973e0fee276a6ed9e39cd5421067a174b74b701bec3857
0x7b61351e40931b104f3ce3f9b84bb2b89bc6073fc4e883a78e9f0e185208e150
0x67a2c892e6f48ff16ae1a8c63106570b163088bcb9834c24dfc0a4d8e53c2eb1

10 RSZ SAVED IN OUTPUT FILE

[Program finished]



256 bit:


04da0c0eccdaddfdb91660e4396cb71ba0ebd8366f846b0f802b9244b9e3005353a44080a50720b 86ac59045d3b3cccc663f9e7222c2c4b8ca035715ab04156a8c

tra1= 1
0xd8aac18e73d9a7c136d7398a350caeeea9b9d1ec246d681b37be23efdeaf0ead
0x26c84badbeb4129150cf7f134033a0c9ec23de55526430de3e145cebc66e54c
0x44e90ff26d1fe061b001ab978791b63a7ce10f60205783733d8dfb100350a6b0

tra2= 2
0xf95bcd799f0e05c2c599f9e1759bfdedc2391503258fc97233252f817ecd14dd
0x67b27d72242d96d4f61a0ecb51626f1165080f450055e14aeb9ddd8608920ed2
0x535899310533fda2214bdb4f18b39ab40b16ceb344b1cbbc35f5c1035bd3ecfc

tra3= 3
0x93b148640bbc45188201fdfa9ee22786e5190ebf383ae6b5ca33942342cddc50
0xf470a1e0a21da9b4a5399cc48ce8b413dcdc4376fc71e452853c87868aabfc0a
0x3bd17e61df8378ccd7034990dd5256467c8aedee274d8bc866f6786ee77db4d4

tra4= 4
0x9ec9a44c42ae3524acd700854796df0bd762506bd3441b0ddff3d5d925ac7a24
0x4d7415706997116f248df3dc27785e3dddd93b314dc967b4199513d7ef0237e3
0x4c30aa88a3511376cafc5acb490ede9bd6a3fa816ff7044f7bdfbbf95f22ccc3

tra5= 5
0xcc68004885a73784f1dece6efc9ab5bfd949174708ba013a7f71f14c12ac6758
0xd8820b6f939424c157a234780b60a90a23d8c0c98c6f0a60501424e1d0a5bec6
0x7abd0201ab1a9be44f51ee75c2cf762d1136f021f3f38bba6e27c0f93378b588

tra6= 6
0xf39519208e088fc400530c4de1e59938cb38e354f94e37ae650fc543a440e6cc
0x4e72e7329d3085445a02dee05cf7c3471642b2a0ea4c82755465c5b6d1a37fbd
0x32f203501f07a9d9b21b24961f2eba67534c50eb433f773146a241097d0cd5fe

tra7= 7
0xe6567271cf28a77b2ae3ffda81d4d49b854c51afb14cce2f9bf2682a1e304517
0x63dc96597a33f4c0760246739f011b141ce4503439c359ee46ae533fb2f4278b
0x59f55fd58d34ba777fdded8908f0ca968f4eecc2484d37333901d53428c15534

tra8= 8
0xa1e3b6aaafe6f30241c38b7d2e55c6103402042a774a7ebc8f92222abb2337c9
0x4804d2ff368e2dcb57004a4ede412252a89287cd7f3e199e4d0c806c9a60286b
0x2c30c74f87e86f3748e978ad0324858bcb32acc6d632cf1a284dac6fffd64af1

tra9= 9
0xb2685a12243dd7fac8df8a47bc2d135a1215eb5cbf0cf8189bac675142ecd070
0xe07d54baa88f0dedab0c294030e8d9afc6cc3cb08be5df769d7060b24d9d0cd2
0x44738028645d0c36f6c98c20ce851225c6d6573c711ef02401afbb2aec44b1fd

tra10= 10
0xdcb9171228807f80a371314c930d396fe69b7532c1efa376c6aeded73cf84a16
0x1655d9480488d7ad27dbac06192e6cc6a5c24a43359694e69344a800882b7345
0x504b816e2cb47d4ae5c92136f603a294341a5dc0df722db0a33353c78152a885

tra11= 11
0xe1eb4ad583fe5e005d005251742a1a531ad8e681b4a6a719c6cfaf6ff7c39eb8
0x983a64d65de22f21b0647d4bcca52cf68480e02fa540634cfdb917a9f2e956f6
0x579a1bea57655cda5ddf9c703a5b7794aa7f44caa0fe62a0924e8eb88408507b

tra12= 12
0xd8880b3aba79e96c59dfea5485b46feb7051f1736ea6c1353f1ebb246707fc73
0xe4958d24a3fb20d8aab01749ce1e7266fa87cd0a9a3d7e431b5e04fee2f2933a
0x5fcc925baab2836d6def905804d878d2ed99e185a3f7f6fd5150070125f0ac35

tra13= 13
0xe3f728618c54db9cf6e2942f1e163d4fbc7599fc7092f46236142ddbab778c91
0x703d143072e794c804b63006ec23b5b89aef8906b96773d2a74a73a46c971ffe
0x6295346e0ae6458586a880814b9cc81fca29223c735e25737c753619fc0a8a02

tra14= 14
0xb7205ee18522f136dea1bf0549971ae3192f86f89f86903efa7f56cdf2f2ea8e
0x17a364bfdee6660b170b04cb71ad19c2d3942104d53f5f9e5c39032afd0f2164
0x3e7d29c326c9bcd932283c369e2660494da596a895042bdd3c8625ab995f3c8d

tra15= 15
0xbd029eb9abd465c5f24bd81b8891e476bc946ae118dcfdfea741152f380c5415
0x4fd77085af20d843e23226091bf262b8baa35a2e289778bffb5eb15995a5a3fc
0x6895d81a764c31ae08dd747e6c8f45cc99908d1a3a0e4c064f6fbcf5235fe886

tra16= 16
0xca53054b467d2e83bc0d70e325ca0fa34b1e9717c89133d9f6dc4be6ef5995de
0x79895b62985019b693be537ede19f42fa0ad7a5694cd717870f212623d4d4215
0x1a1229ae40cd8fc9fff984a7ecf419680257e324f065654c4eb41a9d3ea9dc3a

tra17= 17
0xd882254aab375dbea7c003c8ea840e2c890e24c7780145a59abb6e854e65fc05
0x4e661ad063a77855e6cea716695d5c52549d45f30cf76d32b0b11f8e3ec72dd3
0x248f4f7a9e5fc74225ffa23c2e69e6f51545310f3600349138d39d1e2b30b0e5

tra18= 18
0x805cbbee4e5e336f9be72509ed7765820ea6ccfa91f655b9bddac9929543d855
0x5efedde128300b51e26cb8b8893089d18f8fb1fee97596c9271e5d2c1faaf62a
0x11c8d8d8e8a9c282a522937fd7d2c64d4663695d8529dc8e5ba9ceeb8b1f989b

tra19= 19
0xd376daf9cdb7b0c2fab12965e58ba29476def598331909b2b1ef9caeaec257b2
0x2162196b516f035f469469f05a6982663ebd472dd601d9ee206fefb69afb0e08
0x7b93c6ace7471862f073ef2cd4afa4559305c3484b19df43622dc71c66c83031

19 RSZ SAVED IN OUTPUT FILE




?
Activity: -
Merit: -
@bitcoinend

troble with latticce, lattice cant break 256 bit nonce, many adresses Has no 100 rsz for ex.You scrypt need 10 rsz,- this is more good tgen my scrypt.

If you breack 254...256 it will be good, but I thin no lack will be


I don't use lattice methods, i use some other method i invented.
you are correct with lattice you can't do much.
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
@bitcoinend

troble with latticce, lattice cant break 256 bit nonce, many adresses Has no 100 rsz for ex.You scrypt need 10 rsz,- this is more good tgen my scrypt.

If you breack 254...256 it will be good, but I thin no lack will be
?
Activity: -
Merit: -
Less 200 bit

Privkey ?

04a885c374a9ca2110f2a92e157cf56e522be3e2a772c37b60324907dd527e6c4afac800ecc2d33 eab45f728cf18b1dcc3dba18cbd031d2fea5d52e21144c43292

tra1= 1
r1= 41565872560242209245985630894953722539561019830771503409380069854642835139660
s1= 46167697913957461218506289444898918867418909747391962463833839991148694956615
z1= 104630186537044373229025543623925248392869011065872824899506355123392418664701

tra2= 2
r2= 40362905993303186892727576539120639590744872013468303189628119988875367021363
s2= 8918722928905970064019264461524104329899290051689410020759449205555926090846
z2= 86561738864438169859743216050244971638199755679352424617453518227764854275113

tra3= 3
r3= 25227009836206853146066274158995906067712252382952926847011580079258124051832
s3= 34766875462834686582192424889565682581131461857777419964587416512193135751074
z3= 79817306508913719907099177483547750005702911789948641880602644303065989235492

tra4= 4
r4= 92325727640773617583665427532142197558187923462544104678534862941082044556363
s4= 6224825729540931937933016415048916941423257399800081331408045994527285680767
z4= 93564540381315851155740874541338221942691911675712683316763897837468622327895

tra5= 5
r5= 46916155570972263119747789707938016004455678383376661626938318859647059992150
s5= 2808362462509154258392538920672366275518138305921285538304236691475907042430
z5= 83121620153025663653557679187572740023547956092150547189743265650337381719770

tra6= 6
r6= 18788833082689876886873942688021588118985177937169687678186798540956890596666
s6= 47325451885674650638380694110263291739762382536813151360268597457383529515904
z6= 63738954508955662102576897079741747740230419508766910869430371794438560474393

tra7= 7
r7= 100558611642189173736372820835356695971474030835791215864780532245248298365754
s7= 26992763885730387324497330918603620565202144731990083288777969805508169695393
z7= 107193087403238094588484826690859188257189441020030141970982589419616226516519

tra8= 8
r8= 69869454531635138646430925605841610643991817049631568327802228880787552111940
s8= 57174573365292191562615510040027347778730170398218235301567310336970393777831
z8= 86889567024107712348112710302279565188522186171025854881914278304158234543020

tra9= 9
r9= 43519824599340269147253843009083347138048449020628507011935485144030943054517
s9= 13950835696820418627108689331594903696313300128609714200714201522342528896190
z9= 94459838706412646173836133190673074282437309201032512475270278267668073359602

tra10= 10
r10= 51937535325749168464222246901531970828610328082176905606299178472536193592216
s10= 17372938005414886861848607684580152299106919007920620976958383962893434286138
z10= 72554995752777389041443022964620966289026088653876662165578241695947492124816

tra11= 11
r11= 6679412811491885742270192144071612338943160719456195832987770587038974860343
s11= 28035223868011527961703107804390138460583125110704185041700240637502073744749
z11= 80858732891232320209019113764356900563178711207586056440455349937830353905891

tra12= 12
r12= 71000344179394965717395675695365935217390364725397883744880045853892212498468
s12= 44559501722759847437941978962068979005852110069368763518464494924041194777762
z12= 90833343858703398875072762318592084896556979787024585621481496490332657661325

tra13= 13
r13= 89978542637620994841824602159581860020850115657321405741328015919862127955794
s13= 31290605786259389756164219548170242713722284011122478144583578763906814753787
z13= 94566315297045507031928222366843785786800050163879484995242019162132074454178

tra14= 14
r14= 20678172651371024148903149169662813509131536884666466460008627370286131475739
s14= 35967090006983255349545393352990493603204929038212942628795116684901414860055
z14= 95980320197558816883220935740232660832998252884852342503720971297117572024203

14 RSZ SAVED IN OUTPUT FILE

[Program finished]

your private key is 17667188011415688292006461

Yes prob is right, try another one:

little bit less 200 bit


04d065447b43b466c918335a5e4872efb5c77825aa5253784c33e3c6b6208c575cfa6340a5866ee 7324ffd4709f8ffb89e3c7fb7f616641ed85c737ca4cd69d80e

tra1= 1
r1= 35781056790654206361636626106532587187001414253679897837887838156475723466668
s1= 6420483661399729901071896193492157113485221530257654649758159620805313613799
z1= 100547791275647556398004216387559085805536951048167777884880996562228107084543

tra2= 2
r2= 73941488516126000796052657471876964190587110358439694629074501102022442106431
s2= 56598608452060255983088408972484035241154438153411513200294533230103261078097
z2= 63995063473560138781054408796374718094944556560947394457490921322289893158511

tra3= 3
r3= 1886384249350604282445977799790732413262893800649925232864942917722896591913
s3= 18948812640424305919439971361881005545112811587533619572845580193644176261363
z3= 102563150449971251059219801524954925615383373005226869323672394588175077321751

tra4= 4
r4= 36945364969169061704191115706500123314114008357653438136827080483772991167615
s4= 49106715924334893265546835118393792174316593830813027016490803089436103398052
z4= 70034016739470279793714855528952349918788831631152513270024650215551741471627

tra5= 5
r5= 91585757637746210331660349293789270118038759826152485403274549511906278323143
s5= 3097380967576664827495120296388397518247628453757190562676448135201836131854
z5= 66004996063908293410916212480096343228691085405136523677902709077908982160373

tra6= 6
r6= 100025893124081125891441242917061158948888745006344470411710718254021411619130
s6= 16099749656802874644818974287264644228888171432792163203577233666517235743109
z6= 87806900907564738397549610717773453177076449571783531109586605129269711167428

tra7= 7
r7= 8039716606820365938099904307893390067763291558116635494688608982298157842181
s7= 5091661312087060987187659976856511351732753252666848778115499995279239640811
z7= 75164557710878619072922020899702711526546027856036524447007198503963339749739

tra8= 8
r8= 102324203246603908807363456747628488714439305933981021093819405980483489349666
s8= 14446387861770368683427544757635650778693535978495755458995760826016925065782
z8= 61323027374152455674257148071709377842853643332899883770546261631226880337431

tra9= 9
r9= 52759726271775744856957135612527423299411333468564654090438178051981085882860
s9= 1027972243996974591111638168650284633586382718032866234046069461801784387151
z9= 70507009100503426475242745687606059486536074648509521251195691825697780454968

tra10= 10
r10= 59734964257338792796604981981071829993152131038018988108563957979537513963982
s10= 28368794004434313689095067308979565277712183029661494027471135718667797459755
z10= 105326900337310388649051558330024517737048592594255547884173151326797798704154

10 RSZ SAVED IN OUTPUT FILE



04d065447b43b466c918335a5e4872efb5c77825aa5253784c33e3c6b6208c575cfa6340a5866ee 7324ffd4709f8ffb89e3c7fb7f616641ed85c737ca4cd69d80e


can you try 256 bit with any rsz(i can generate 3000 rsz for ex) ?

I can, can you send the x and y of the public key and the signatures in the following format? too tired to do it manually lol

format of signattues:
[["0xf85f89c1e8197ffe881c7c52839e9726877b86e25805d860470e4501eaef9d0e", "0x82b15151ffb3c99d3eb6d7b5511c4ba6744fae2aa34f664f95d9cacb4ace127c", "0x99b052f6c3ced91f0e08c1137ae3a78bce0e099f9c3d8882c23a91e56ddc2ebd"], ["0xbe8e0599cf99a41e455331b845ed3512b6c347724bdc017f7a43c584f86bfa08", "0x67c3fd2d6d7ab141609c0f524ba41af22d89ee23d462393b015417965c699587", "0xa58e97eed0b4efd03f06f07aea523d667202705bac077c0cb04eedce1260e12e"]]

in this example we have two signatures.
the first item is the hashed message, then the r value and then the s value.
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Less 200 bit

Privkey ?

04a885c374a9ca2110f2a92e157cf56e522be3e2a772c37b60324907dd527e6c4afac800ecc2d33 eab45f728cf18b1dcc3dba18cbd031d2fea5d52e21144c43292

tra1= 1
r1= 41565872560242209245985630894953722539561019830771503409380069854642835139660
s1= 46167697913957461218506289444898918867418909747391962463833839991148694956615
z1= 104630186537044373229025543623925248392869011065872824899506355123392418664701

tra2= 2
r2= 40362905993303186892727576539120639590744872013468303189628119988875367021363
s2= 8918722928905970064019264461524104329899290051689410020759449205555926090846
z2= 86561738864438169859743216050244971638199755679352424617453518227764854275113

tra3= 3
r3= 25227009836206853146066274158995906067712252382952926847011580079258124051832
s3= 34766875462834686582192424889565682581131461857777419964587416512193135751074
z3= 79817306508913719907099177483547750005702911789948641880602644303065989235492

tra4= 4
r4= 92325727640773617583665427532142197558187923462544104678534862941082044556363
s4= 6224825729540931937933016415048916941423257399800081331408045994527285680767
z4= 93564540381315851155740874541338221942691911675712683316763897837468622327895

tra5= 5
r5= 46916155570972263119747789707938016004455678383376661626938318859647059992150
s5= 2808362462509154258392538920672366275518138305921285538304236691475907042430
z5= 83121620153025663653557679187572740023547956092150547189743265650337381719770

tra6= 6
r6= 18788833082689876886873942688021588118985177937169687678186798540956890596666
s6= 47325451885674650638380694110263291739762382536813151360268597457383529515904
z6= 63738954508955662102576897079741747740230419508766910869430371794438560474393

tra7= 7
r7= 100558611642189173736372820835356695971474030835791215864780532245248298365754
s7= 26992763885730387324497330918603620565202144731990083288777969805508169695393
z7= 107193087403238094588484826690859188257189441020030141970982589419616226516519

tra8= 8
r8= 69869454531635138646430925605841610643991817049631568327802228880787552111940
s8= 57174573365292191562615510040027347778730170398218235301567310336970393777831
z8= 86889567024107712348112710302279565188522186171025854881914278304158234543020

tra9= 9
r9= 43519824599340269147253843009083347138048449020628507011935485144030943054517
s9= 13950835696820418627108689331594903696313300128609714200714201522342528896190
z9= 94459838706412646173836133190673074282437309201032512475270278267668073359602

tra10= 10
r10= 51937535325749168464222246901531970828610328082176905606299178472536193592216
s10= 17372938005414886861848607684580152299106919007920620976958383962893434286138
z10= 72554995752777389041443022964620966289026088653876662165578241695947492124816

tra11= 11
r11= 6679412811491885742270192144071612338943160719456195832987770587038974860343
s11= 28035223868011527961703107804390138460583125110704185041700240637502073744749
z11= 80858732891232320209019113764356900563178711207586056440455349937830353905891

tra12= 12
r12= 71000344179394965717395675695365935217390364725397883744880045853892212498468
s12= 44559501722759847437941978962068979005852110069368763518464494924041194777762
z12= 90833343858703398875072762318592084896556979787024585621481496490332657661325

tra13= 13
r13= 89978542637620994841824602159581860020850115657321405741328015919862127955794
s13= 31290605786259389756164219548170242713722284011122478144583578763906814753787
z13= 94566315297045507031928222366843785786800050163879484995242019162132074454178

tra14= 14
r14= 20678172651371024148903149169662813509131536884666466460008627370286131475739
s14= 35967090006983255349545393352990493603204929038212942628795116684901414860055
z14= 95980320197558816883220935740232660832998252884852342503720971297117572024203

14 RSZ SAVED IN OUTPUT FILE

[Program finished]

your private key is 17667188011415688292006461

Yes prob is right, try another one:

little bit less 200 bit


04d065447b43b466c918335a5e4872efb5c77825aa5253784c33e3c6b6208c575cfa6340a5866ee 7324ffd4709f8ffb89e3c7fb7f616641ed85c737ca4cd69d80e

tra1= 1
r1= 35781056790654206361636626106532587187001414253679897837887838156475723466668
s1= 6420483661399729901071896193492157113485221530257654649758159620805313613799
z1= 100547791275647556398004216387559085805536951048167777884880996562228107084543

tra2= 2
r2= 73941488516126000796052657471876964190587110358439694629074501102022442106431
s2= 56598608452060255983088408972484035241154438153411513200294533230103261078097
z2= 63995063473560138781054408796374718094944556560947394457490921322289893158511

tra3= 3
r3= 1886384249350604282445977799790732413262893800649925232864942917722896591913
s3= 18948812640424305919439971361881005545112811587533619572845580193644176261363
z3= 102563150449971251059219801524954925615383373005226869323672394588175077321751

tra4= 4
r4= 36945364969169061704191115706500123314114008357653438136827080483772991167615
s4= 49106715924334893265546835118393792174316593830813027016490803089436103398052
z4= 70034016739470279793714855528952349918788831631152513270024650215551741471627

tra5= 5
r5= 91585757637746210331660349293789270118038759826152485403274549511906278323143
s5= 3097380967576664827495120296388397518247628453757190562676448135201836131854
z5= 66004996063908293410916212480096343228691085405136523677902709077908982160373

tra6= 6
r6= 100025893124081125891441242917061158948888745006344470411710718254021411619130
s6= 16099749656802874644818974287264644228888171432792163203577233666517235743109
z6= 87806900907564738397549610717773453177076449571783531109586605129269711167428

tra7= 7
r7= 8039716606820365938099904307893390067763291558116635494688608982298157842181
s7= 5091661312087060987187659976856511351732753252666848778115499995279239640811
z7= 75164557710878619072922020899702711526546027856036524447007198503963339749739

tra8= 8
r8= 102324203246603908807363456747628488714439305933981021093819405980483489349666
s8= 14446387861770368683427544757635650778693535978495755458995760826016925065782
z8= 61323027374152455674257148071709377842853643332899883770546261631226880337431

tra9= 9
r9= 52759726271775744856957135612527423299411333468564654090438178051981085882860
s9= 1027972243996974591111638168650284633586382718032866234046069461801784387151
z9= 70507009100503426475242745687606059486536074648509521251195691825697780454968

tra10= 10
r10= 59734964257338792796604981981071829993152131038018988108563957979537513963982
s10= 28368794004434313689095067308979565277712183029661494027471135718667797459755
z10= 105326900337310388649051558330024517737048592594255547884173151326797798704154

10 RSZ SAVED IN OUTPUT FILE



04d065447b43b466c918335a5e4872efb5c77825aa5253784c33e3c6b6208c575cfa6340a5866ee 7324ffd4709f8ffb89e3c7fb7f616641ed85c737ca4cd69d80e


can you try 256 bit with many rsz(i can generate 3000 rsz for ex) ?
?
Activity: -
Merit: -
Less 200 bit

Privkey ?

04a885c374a9ca2110f2a92e157cf56e522be3e2a772c37b60324907dd527e6c4afac800ecc2d33 eab45f728cf18b1dcc3dba18cbd031d2fea5d52e21144c43292

tra1= 1
r1= 41565872560242209245985630894953722539561019830771503409380069854642835139660
s1= 46167697913957461218506289444898918867418909747391962463833839991148694956615
z1= 104630186537044373229025543623925248392869011065872824899506355123392418664701

tra2= 2
r2= 40362905993303186892727576539120639590744872013468303189628119988875367021363
s2= 8918722928905970064019264461524104329899290051689410020759449205555926090846
z2= 86561738864438169859743216050244971638199755679352424617453518227764854275113

tra3= 3
r3= 25227009836206853146066274158995906067712252382952926847011580079258124051832
s3= 34766875462834686582192424889565682581131461857777419964587416512193135751074
z3= 79817306508913719907099177483547750005702911789948641880602644303065989235492

tra4= 4
r4= 92325727640773617583665427532142197558187923462544104678534862941082044556363
s4= 6224825729540931937933016415048916941423257399800081331408045994527285680767
z4= 93564540381315851155740874541338221942691911675712683316763897837468622327895

tra5= 5
r5= 46916155570972263119747789707938016004455678383376661626938318859647059992150
s5= 2808362462509154258392538920672366275518138305921285538304236691475907042430
z5= 83121620153025663653557679187572740023547956092150547189743265650337381719770

tra6= 6
r6= 18788833082689876886873942688021588118985177937169687678186798540956890596666
s6= 47325451885674650638380694110263291739762382536813151360268597457383529515904
z6= 63738954508955662102576897079741747740230419508766910869430371794438560474393

tra7= 7
r7= 100558611642189173736372820835356695971474030835791215864780532245248298365754
s7= 26992763885730387324497330918603620565202144731990083288777969805508169695393
z7= 107193087403238094588484826690859188257189441020030141970982589419616226516519

tra8= 8
r8= 69869454531635138646430925605841610643991817049631568327802228880787552111940
s8= 57174573365292191562615510040027347778730170398218235301567310336970393777831
z8= 86889567024107712348112710302279565188522186171025854881914278304158234543020

tra9= 9
r9= 43519824599340269147253843009083347138048449020628507011935485144030943054517
s9= 13950835696820418627108689331594903696313300128609714200714201522342528896190
z9= 94459838706412646173836133190673074282437309201032512475270278267668073359602

tra10= 10
r10= 51937535325749168464222246901531970828610328082176905606299178472536193592216
s10= 17372938005414886861848607684580152299106919007920620976958383962893434286138
z10= 72554995752777389041443022964620966289026088653876662165578241695947492124816

tra11= 11
r11= 6679412811491885742270192144071612338943160719456195832987770587038974860343
s11= 28035223868011527961703107804390138460583125110704185041700240637502073744749
z11= 80858732891232320209019113764356900563178711207586056440455349937830353905891

tra12= 12
r12= 71000344179394965717395675695365935217390364725397883744880045853892212498468
s12= 44559501722759847437941978962068979005852110069368763518464494924041194777762
z12= 90833343858703398875072762318592084896556979787024585621481496490332657661325

tra13= 13
r13= 89978542637620994841824602159581860020850115657321405741328015919862127955794
s13= 31290605786259389756164219548170242713722284011122478144583578763906814753787
z13= 94566315297045507031928222366843785786800050163879484995242019162132074454178

tra14= 14
r14= 20678172651371024148903149169662813509131536884666466460008627370286131475739
s14= 35967090006983255349545393352990493603204929038212942628795116684901414860055
z14= 95980320197558816883220935740232660832998252884852342503720971297117572024203

14 RSZ SAVED IN OUTPUT FILE

[Program finished]

your private key is 17667188011415688292006461
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Less 200 bit

Privkey ?

04a885c374a9ca2110f2a92e157cf56e522be3e2a772c37b60324907dd527e6c4afac800ecc2d33 eab45f728cf18b1dcc3dba18cbd031d2fea5d52e21144c43292

tra1= 1
r1= 41565872560242209245985630894953722539561019830771503409380069854642835139660
s1= 46167697913957461218506289444898918867418909747391962463833839991148694956615
z1= 104630186537044373229025543623925248392869011065872824899506355123392418664701

tra2= 2
r2= 40362905993303186892727576539120639590744872013468303189628119988875367021363
s2= 8918722928905970064019264461524104329899290051689410020759449205555926090846
z2= 86561738864438169859743216050244971638199755679352424617453518227764854275113

tra3= 3
r3= 25227009836206853146066274158995906067712252382952926847011580079258124051832
s3= 34766875462834686582192424889565682581131461857777419964587416512193135751074
z3= 79817306508913719907099177483547750005702911789948641880602644303065989235492

tra4= 4
r4= 92325727640773617583665427532142197558187923462544104678534862941082044556363
s4= 6224825729540931937933016415048916941423257399800081331408045994527285680767
z4= 93564540381315851155740874541338221942691911675712683316763897837468622327895

tra5= 5
r5= 46916155570972263119747789707938016004455678383376661626938318859647059992150
s5= 2808362462509154258392538920672366275518138305921285538304236691475907042430
z5= 83121620153025663653557679187572740023547956092150547189743265650337381719770

tra6= 6
r6= 18788833082689876886873942688021588118985177937169687678186798540956890596666
s6= 47325451885674650638380694110263291739762382536813151360268597457383529515904
z6= 63738954508955662102576897079741747740230419508766910869430371794438560474393

tra7= 7
r7= 100558611642189173736372820835356695971474030835791215864780532245248298365754
s7= 26992763885730387324497330918603620565202144731990083288777969805508169695393
z7= 107193087403238094588484826690859188257189441020030141970982589419616226516519

tra8= 8
r8= 69869454531635138646430925605841610643991817049631568327802228880787552111940
s8= 57174573365292191562615510040027347778730170398218235301567310336970393777831
z8= 86889567024107712348112710302279565188522186171025854881914278304158234543020

tra9= 9
r9= 43519824599340269147253843009083347138048449020628507011935485144030943054517
s9= 13950835696820418627108689331594903696313300128609714200714201522342528896190
z9= 94459838706412646173836133190673074282437309201032512475270278267668073359602

tra10= 10
r10= 51937535325749168464222246901531970828610328082176905606299178472536193592216
s10= 17372938005414886861848607684580152299106919007920620976958383962893434286138
z10= 72554995752777389041443022964620966289026088653876662165578241695947492124816

tra11= 11
r11= 6679412811491885742270192144071612338943160719456195832987770587038974860343
s11= 28035223868011527961703107804390138460583125110704185041700240637502073744749
z11= 80858732891232320209019113764356900563178711207586056440455349937830353905891

tra12= 12
r12= 71000344179394965717395675695365935217390364725397883744880045853892212498468
s12= 44559501722759847437941978962068979005852110069368763518464494924041194777762
z12= 90833343858703398875072762318592084896556979787024585621481496490332657661325

tra13= 13
r13= 89978542637620994841824602159581860020850115657321405741328015919862127955794
s13= 31290605786259389756164219548170242713722284011122478144583578763906814753787
z13= 94566315297045507031928222366843785786800050163879484995242019162132074454178

tra14= 14
r14= 20678172651371024148903149169662813509131536884666466460008627370286131475739
s14= 35967090006983255349545393352990493603204929038212942628795116684901414860055
z14= 95980320197558816883220935740232660832998252884852342503720971297117572024203

14 RSZ SAVED IN OUTPUT FILE

[Program finished]
copper member
Activity: 2338
Merit: 4543
I can do it of course, i just want to prove it to you

So far all you've proven is that you can't.

Break one of Satoshi's keys, then post a message singed with it.  That's all the proof I need.
newbie
Activity: 5
Merit: 168
Guess the best thing to do in case of successful ECC Break is to expropriate some of Satoshi Funds and live happily ever after.
But certainly not to cry it out loud about it.
To me the thread started looks like some scam shit.
?
Activity: -
Merit: -
there is no issue with your program, i just need it in this file and i need 10 signatures

No one wants to waste anymore of their time on your fantasy.  BlackHatCoiner posted his code, you can use it to create signatures until the cows come home, and test your bitcoin ender until the cows come home tomorrow.

Or better yet, do like franky1 suggested and try to break one of Satoshi's addresses.

we can use his code, we just need more signatures

Create your own key, make as many signatures as you want.  I'm not even a coder and I can figure that part out.  How the fuck did you get as far as you've gotten without being able to solve such a basic issue?

I can do it of course, i just want to prove it to you

Scrypt generates sighnatures, I have to scrypt for generate and scrypt for lattice solve, yes privkey will ve finded. This is not new,sabject. What new in your code ?

And you need soecific messages.


How you think find any Rial privkey from rsz from blockchain ?

No idea what you talk about, Mine doesn't need specific messages

can you, or anyone else just try my code and send the public key + 10 signatures?
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
there is no issue with your program, i just need it in this file and i need 10 signatures

No one wants to waste anymore of their time on your fantasy.  BlackHatCoiner posted his code, you can use it to create signatures until the cows come home, and test your bitcoin ender until the cows come home tomorrow.

Or better yet, do like franky1 suggested and try to break one of Satoshi's addresses.

we can use his code, we just need more signatures

Create your own key, make as many signatures as you want.  I'm not even a coder and I can figure that part out.  How the fuck did you get as far as you've gotten without being able to solve such a basic issue?

I can do it of course, i just want to prove it to you

Scrypt generates sighnatures, I have to scrypt for generate and scrypt for lattice solve, yes privkey will ve finded. This is not new,sabject. What new in your code ?

And you need soecific messages.


How you think find any Rial privkey from rsz from blockchain ?
?
Activity: -
Merit: -
there is no issue with your program, i just need it in this file and i need 10 signatures

No one wants to waste anymore of their time on your fantasy.  BlackHatCoiner posted his code, you can use it to create signatures until the cows come home, and test your bitcoin ender until the cows come home tomorrow.

Or better yet, do like franky1 suggested and try to break one of Satoshi's addresses.

we can use his code, we just need more signatures

Create your own key, make as many signatures as you want.  I'm not even a coder and I can figure that part out.  How the fuck did you get as far as you've gotten without being able to solve such a basic issue?

I can do it of course, i just want to prove it to you
copper member
Activity: 2338
Merit: 4543
there is no issue with your program, i just need it in this file and i need 10 signatures

No one wants to waste anymore of their time on your fantasy.  BlackHatCoiner posted his code, you can use it to create signatures until the cows come home, and test your bitcoin ender until the cows come home tomorrow.

Or better yet, do like franky1 suggested and try to break one of Satoshi's addresses.

we can use his code, we just need more signatures

Create your own key, make as many signatures as you want.  I'm not even a coder and I can figure that part out.  How the fuck did you get as far as you've gotten without being able to solve such a basic issue?
?
Activity: -
Merit: -
there is no issue with your program, i just need it in this file and i need 10 signatures

No one wants to waste anymore of their time on your fantasy.  BlackHatCoiner posted his code, you can use it to create signatures until the cows come home, and test your bitcoin ender until the cows come home tomorrow.

Or better yet, do like franky1 suggested and try to break one of Satoshi's addresses.

we can use his code, we just need more signatures
copper member
Activity: 2338
Merit: 4543
there is no issue with your program, i just need it in this file and i need 10 signatures

No one wants to waste anymore of their time on your fantasy.  BlackHatCoiner posted his code, you can use it to create signatures until the cows come home, and test your bitcoin ender until the cows come home tomorrow.

Or better yet, do like franky1 suggested and try to break one of Satoshi's addresses.
?
Activity: -
Merit: -
could you try this code? I'm pretty sure i didn't fuck it up by having a backdoor by mistake.
No, and I don't think mine is faulty either. You said you can do something. It turns out that you cannot, unless readers run your key generation program.

My program is pretty simple to read. If you can detect an error, let me know. I'm not going to read what your program does, nor do I care. I replied to the thread, because I thought you would break cryptography. Not your cryptography.

Use your code. Just send more signatures.
?
Activity: -
Merit: -
could you try this code? I'm pretty sure i didn't fuck it up by having a backdoor by mistake.
No, and I don't think mine is faulty either. You said you can do something. It turns out that you cannot, unless readers run your key generation program.

Give it a try. you can run it using python python execution websites. it's a second.
could you try this code? I'm pretty sure i didn't fuck it up by having a backdoor by mistake.
No, and I don't think mine is faulty either. You said you can do something. It turns out that you cannot, unless readers run your key generation program.

My program is pretty simple to read. If you can detect an error, let me know. I'm not going to read what your program does, nor do I care. I replied to the thread, because I thought you would break cryptography. Not your cryptography.

there is no issue with your program, i just need it in this file and i need 10 signatures
legendary
Activity: 1512
Merit: 7340
Farewell, Leo
could you try this code? I'm pretty sure i didn't fuck it up by having a backdoor by mistake.
No, and I don't think mine is faulty either. You said you can do something. It turns out that you cannot, unless readers run your key generation program.

My program is pretty simple to read. If you can detect an error, let me know. I'm not going to read what your program does, nor do I care. I replied to the thread, because I thought you would break cryptography. Not your cryptography.
?
Activity: -
Merit: -
So it didn't work in the end?

OP did you write the script yourself or got it from somewhere?

Myself. that's why it so messy Smiley


Idk man, maybe i did something wrong in my script. can you verify that it randomly generates signatures with random utpo 200 bit key and nonce?
Here's my program. As you can see, private key and nonce values are 160 bits.

Code:
import random
import hashlib
from ecdsa import SigningKey, SECP256k1
from ecdsa.util import sigdecode_string, sigencode_string

weak_private_key_int = random.getrandbits(160)
weak_private_key = SigningKey.from_secret_exponent(weak_private_key_int, curve=SECP256k1)

public_key = weak_private_key.verifying_key

print("Weak Private Key (Hex):", hex(weak_private_key_int))
print("Public Key (Hex):", public_key.to_string("compressed").hex())

message1 = b"BlackHatCoiner"
message2 = b"Break this message"


z1 = int.from_bytes(hashlib.sha256(message1).digest(), "big")
z2 = int.from_bytes(hashlib.sha256(message2).digest(), "big")

weak_k1 = random.getrandbits(160)
weak_k2 = random.getrandbits(160)

signature1 = weak_private_key.sign_digest_deterministic(
    hashlib.sha256(message1).digest(),
    sigencode=sigencode_string,
    extra_entropy=weak_k1.to_bytes(32, 'big')  # Inject weak k
)

signature2 = weak_private_key.sign_digest_deterministic(
    hashlib.sha256(message2).digest(),
    sigencode=sigencode_string,
    extra_entropy=weak_k2.to_bytes(32, 'big')  # Inject weak k
)


r1, s1 = sigdecode_string(signature1, weak_private_key.curve.order)
r2, s2 = sigdecode_string(signature2, weak_private_key.curve.order)


print("\nSignature 1:")
print(f"R1 = {hex(r1)}")
print(f"S1 = {hex(s1)}")
print(f"Z1 = {hex(z1)}")
print(f"k1 = {hex(weak_k1)} (Weak Nonce)")

print("\nSignature 2:")
print(f"R2 = {hex(r2)}")
print(f"S2 = {hex(s2)}")
print(f"Z2 = {hex(z2)}")
print(f"k2 = {hex(weak_k2)} (Weak Nonce)")


could you try this code? I'm pretty sure i didn't fuck it up by having a backdoor by mistake.

edit:
chatgpt reformatted code:
import hashlib
import random
import os
import json

bitRange = 200

def inverseMod(k, p):
    if k == 0:
        raise ZeroDivisionError('division by zero')
    if k < 0:
        return p - inverseMod(-k, p)

    s, oldS = 0, 1
    t, oldT = 1, 0
    r, oldR = p, k

    while r != 0:
        quotient = oldR // r
        oldR, r = r, oldR - quotient * r
        oldS, s = s, oldS - quotient * s
        oldT, t = t, oldT - quotient * t

    return oldS % p

def pointAdd(point1, point2, p, a):
    if point1 is None:
        return point2
    if point2 is None:
        return point1

    x1, y1 = point1
    x2, y2 = point2

    if x1 == x2 and y1 != y2:
        return None

    m = (y1 - y2) * inverseMod(x1 - x2, p) if x1 != x2 else \
        (3 * x1 * x1 + a) * inverseMod(2 * y1, p)

    x3 = m * m - x1 - x2
    y3 = y1 + m * (x3 - x1)
    return (x3 % p, -y3 % p)

def scalarMult(k, point, p, n, g):
    if k % n == 0 or point is None:
        return None
    if k < 0:
        return scalarMult(-k, (point[0], -point[1] % p), p, n, g)

    result = None
    addend = point
    while k:
        if k & 1:
            result = pointAdd(result, addend, p, 0)
        addend = pointAdd(addend, addend, p, 0)
        k >>= 1
    return result

def hashMessage(message):
    messageHash = hashlib.sha512(message).digest()
    e = int.from_bytes(messageHash, 'big')
    return e >> (e.bit_length() - 256)

def signMessage(privateKey, message, nonce, p, n, g, a):
    z = hashMessage(message)
    k = nonce
    x, y = scalarMult(k, g, p, n, g)
    r = x % n
    s = ((z + r * privateKey) * inverseMod(k, n)) % n
    return r, s, z

def generateSignatures(priv, p, n, g, a, numSignatures=10):
    sigs = []
    for _ in range(numSignatures):
        nonce = random.randrange(1, 2**bitRange)
        note = str(os.urandom(25)) + str(nonce)
        msg = bytes(note, 'utf-8')
        r, s, z = signMessage(priv, msg, nonce, p, n, g, a)
        sigs.append((z, r, s))
    return sigs

def main():
    p = 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffc2f
    a = 0
    b = 7
    g = (0x79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798,
         0x483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8)
    n = 0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141
    h = 1

    priv = random.randrange(2**(bitRange-1), 2**bitRange)
    signatures = generateSignatures(priv, p, n, g, a)

    with open("sigs.json", 'w') as f:
        sigsHex = [[hex(x) if isinstance(x, int) else x for x in sig] for sig in signatures]
        json.dump(sigsHex, f)

    print(f"Private Key = {hex(priv)}")
    point = scalarMult(priv, g, p, n, g)
    print("Public Key (X, Y):", point)

if __name__ == "__main__":
    main()


send me sigs.json and the x y of the public key.
legendary
Activity: 1512
Merit: 7340
Farewell, Leo
Idk man, maybe i did something wrong in my script. can you verify that it randomly generates signatures with random utpo 200 bit key and nonce?
Here's my program. As you can see, private key and nonce values are 160 bits.

Code:
import random
import hashlib
from ecdsa import SigningKey, SECP256k1
from ecdsa.util import sigdecode_string, sigencode_string

weak_private_key_int = random.getrandbits(160)
weak_private_key = SigningKey.from_secret_exponent(weak_private_key_int, curve=SECP256k1)

public_key = weak_private_key.verifying_key

print("Weak Private Key (Hex):", hex(weak_private_key_int))
print("Public Key (Hex):", public_key.to_string("compressed").hex())

message1 = b"BlackHatCoiner"
message2 = b"Break this message"


z1 = int.from_bytes(hashlib.sha256(message1).digest(), "big")
z2 = int.from_bytes(hashlib.sha256(message2).digest(), "big")

weak_k1 = random.getrandbits(160)
weak_k2 = random.getrandbits(160)

signature1 = weak_private_key.sign_digest_deterministic(
    hashlib.sha256(message1).digest(),
    sigencode=sigencode_string,
    extra_entropy=weak_k1.to_bytes(32, 'big')  # Inject weak k
)

signature2 = weak_private_key.sign_digest_deterministic(
    hashlib.sha256(message2).digest(),
    sigencode=sigencode_string,
    extra_entropy=weak_k2.to_bytes(32, 'big')  # Inject weak k
)


r1, s1 = sigdecode_string(signature1, weak_private_key.curve.order)
r2, s2 = sigdecode_string(signature2, weak_private_key.curve.order)


print("\nSignature 1:")
print(f"R1 = {hex(r1)}")
print(f"S1 = {hex(s1)}")
print(f"Z1 = {hex(z1)}")
print(f"k1 = {hex(weak_k1)} (Weak Nonce)")

print("\nSignature 2:")
print(f"R2 = {hex(r2)}")
print(f"S2 = {hex(s2)}")
print(f"Z2 = {hex(z2)}")
print(f"k2 = {hex(weak_k2)} (Weak Nonce)")
sr. member
Activity: 1491
Merit: 320
🐪
So it didn't work in the end?

OP did you write the script yourself or got it from somewhere?
?
Activity: -
Merit: -
So (who would believe Smiley it didn't work. can you please provide more signatures? like upto 10? I have a script to generate them if you want.
I can provide a million of them, but I feel like I'll be wasting my time.

Idk man, maybe i did something wrong in my script. can you verify that it randomly generates signatures with random utpo 200 bit key and nonce?

If you send me the sigs.json file (the output of the script) i can predict the private key using my other script.

import hashlib
import random
import os
import json

BIT_RANGE = 200

class EllipticCurve:
    def __init__(self, name, p, a, b, g, n, h):
        self.name = name
        self.p = p
        self.a = a
        self.b = b
        self.g = g
        self.n = n
        self.h = h

class ECDSA:
    def __init__(self, curve):
        self.curve = curve

    def inverse_mod(self, k, p):
        if k == 0:
            raise ZeroDivisionError('division by zero')
        if k < 0:
            return p - self.inverse_mod(-k, p)

        s, old_s = 0, 1
        t, old_t = 1, 0
        r, old_r = p, k

        while r != 0:
            quotient = old_r // r
            old_r, r = r, old_r - quotient * r
            old_s, s = s, old_s - quotient * s
            old_t, t = t, old_t - quotient * t

        return old_s % p

    def point_add(self, point1, point2):
        if point1 is None:
            return point2
        if point2 is None:
            return point1

        x1, y1 = point1
        x2, y2 = point2

        if x1 == x2 and y1 != y2:
            return None

        m = (y1 - y2) * self.inverse_mod(x1 - x2, self.curve.p) if x1 != x2 else \
            (3 * x1 * x1 + self.curve.a) * self.inverse_mod(2 * y1, self.curve.p)

        x3 = m * m - x1 - x2
        y3 = y1 + m * (x3 - x1)
        return (x3 % self.curve.p, -y3 % self.curve.p)

    def scalar_mult(self, k, point):
        if k % self.curve.n == 0 or point is None:
            return None
        if k < 0:
            return self.scalar_mult(-k, (point[0], -point[1] % self.curve.p))

        result = None
        addend = point
        while k:
            if k & 1:
                result = self.point_add(result, addend)
            addend = self.point_add(addend, addend)
            k >>= 1
        return result

    def make_keypair(self, private):
        public_key = self.scalar_mult(private, self.curve.g)
        return private, public_key

    def hash_message(self, message):
        message_hash = hashlib.sha512(message).digest()
        e = int.from_bytes(message_hash, 'big')
        return e >> (e.bit_length() - self.curve.n.bit_length())

    def sign_message(self, private_key, message, nonce):
        z = self.hash_message(message)
        k = nonce
        x, y = self.scalar_mult(k, self.curve.g)
        r = x % self.curve.n
        s = ((z + r * private_key) * self.inverse_mod(k, self.curve.n)) % self.curve.n
        return r, s, z

    def generate_signatures(self, priv, num_signatures=10):
        sigs = []
        for _ in range(num_signatures):
            nonce = random.randrange(1, 2**BIT_RANGE)
            note = str(os.urandom(25)) + str(nonce)
            msg = bytes(note, 'utf-8')
            private_key, public_key = self.make_keypair(priv)
            r, s, z = self.sign_message(priv, msg, nonce)
            sigs.append((z, r, s))
        return sigs

def main():
    curve = EllipticCurve(
        'secp256k1',
        p=0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffc2f,
        a=0,
        b=7,
        g=(0x79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798,
           0x483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8),
        n=0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141,
        h=1,
    )

    ecdsa = ECDSA(curve)
    priv = random.randrange(2**(BIT_RANGE-1), 2**BIT_RANGE)
    signatures = ecdsa.generate_signatures(priv)

    with open("sigs.json", 'w') as f:
        sigs_hex = [[hex(x) if isinstance(x, int) else x for x in sig] for sig in signatures]
        json.dump(sigs_hex, f)

    print(f"Private Key = {hex(priv)}")

if __name__ == "__main__":
    main()
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Here you go:

Code:
Public Key (Hex): 031f7b4d773de256a16526c6d2226d617e141250272b9f4521acc6db97d0e95cce

Signature 1:
R1 = 0x3076de63523a586e3f0050c1d0960977f1eaf26803d5dfbd139eec1df30480f2
S1 = 0x99a06d579865d4e5f608945a668dad03aa64baf1520b21efc2f90971c207f383
Z1 = 0x8055c4701f995b0c59c86e5c8a93706a7ea424035feec9a8641e8e5a763e7a20

Signature 2:
R2 = 0x669809d5a8007d6f82b4b97188101a9b81f4b6d52b1816dcb508f1c1627cdbeb
S2 = 0x419138af2715f77c0566c491f17405507dd63e7fb6076f2d7d1d87092f3ef25
Z2 = 0xa19d1f3d31d8896ac2626b0f466d0e416ceea61f0f5d935517ab416e08fc9806

Private key, and nonces (k1 and k2) are less than 200 bits. Break it.

So (who would believe Smiley it didn't work. can you please provide more signatures? like upto 10? I have a script to generate them if you want.

can get rsz by yourself

https://github.com/albertobsd/rsz


Provide any proofs what your scrypt is work, pls

 Wink
legendary
Activity: 1512
Merit: 7340
Farewell, Leo
So (who would believe Smiley it didn't work. can you please provide more signatures? like upto 10? I have a script to generate them if you want.
I can provide a million of them, but I feel like I'll be wasting my time.
legendary
Activity: 4424
Merit: 4794
prove it

satoshi made a few transactions from the same key
https://www.blockchain.com/explorer/transactions/btc/f4184fc596403b9d638783cf57adfe4c75c605f6356fbc91338530e9831e9e16
https://www.blockchain.com/explorer/transactions/btc/a16f3ce4dd5deb92d98ef5cf8afeaf0775ebca408f708b2146c4fb42b41e14be
https://www.blockchain.com/explorer/transactions/btc/12b5633bad1f9c167d523ad1aa1947b2732a865bf5414eab2f9e5ae5d5c191ba
https://www.blockchain.com/explorer/transactions/btc/591e91f809d716912ca1d4a9295e70c3e78bab077683f79350f101da64588073
https://www.blockchain.com/explorer/transactions/btc/828ef3b079f9c23829c56fe86e85b4a69d9e06e5b54ea597eef5fb3ffef509fe

HAVE FUN (many have tried for 15 years and failed) im sure you will fail
you can get the sigs and try and break satoshis first stash

the address still holds 195btc. so a good win for you if you can prove it

the great thing about satoshi leaving funds alone and then disappearing is he left people to test bitcoin for vulnerabilities. so if you can break it, prove it
?
Activity: -
Merit: -
Here you go:

Code:
Public Key (Hex): 031f7b4d773de256a16526c6d2226d617e141250272b9f4521acc6db97d0e95cce

Signature 1:
R1 = 0x3076de63523a586e3f0050c1d0960977f1eaf26803d5dfbd139eec1df30480f2
S1 = 0x99a06d579865d4e5f608945a668dad03aa64baf1520b21efc2f90971c207f383
Z1 = 0x8055c4701f995b0c59c86e5c8a93706a7ea424035feec9a8641e8e5a763e7a20

Signature 2:
R2 = 0x669809d5a8007d6f82b4b97188101a9b81f4b6d52b1816dcb508f1c1627cdbeb
S2 = 0x419138af2715f77c0566c491f17405507dd63e7fb6076f2d7d1d87092f3ef25
Z2 = 0xa19d1f3d31d8896ac2626b0f466d0e416ceea61f0f5d935517ab416e08fc9806

Private key, and nonces (k1 and k2) are less than 200 bits. Break it.

So (who would believe Smiley it didn't work. can you please provide more signatures? like upto 10? I have a script to generate them if you want.
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Will not find, 100%


 Grin



First of all, I'd like to say that I have a different account on the forum, and I'm creating this one just to stay anonymous.
I know how this sounds. but here me out.
All i need is one of you to generate a public key with a private key which is below 200 bits (just to note, I already done this method on 256 bit keys. I didn't touch any funds).
Sign at least two messages with that public key.
Include your bitcointalk username in one of them.
The more signatures you provide the faster it'll take my computer to compute it.
10 is well more than enough.

I also have a script to generate these, if you want to save time on that, but i recommend not trusting what i say and write your own script.

Edit: when you send the signatures, send them in this format:

R = 0xHexValue
S = 0xHexValue
Z = 0xHexValue

Note: both the nonce and the private key needs to be below 200 bits.


Hi, you can generate walid signatures for custom publick key ?
legendary
Activity: 1512
Merit: 7340
Farewell, Leo
Here you go:

Code:
Public Key (Hex): 031f7b4d773de256a16526c6d2226d617e141250272b9f4521acc6db97d0e95cce

Signature 1:
R1 = 0x3076de63523a586e3f0050c1d0960977f1eaf26803d5dfbd139eec1df30480f2
S1 = 0x99a06d579865d4e5f608945a668dad03aa64baf1520b21efc2f90971c207f383
Z1 = 0x8055c4701f995b0c59c86e5c8a93706a7ea424035feec9a8641e8e5a763e7a20

Signature 2:
R2 = 0x669809d5a8007d6f82b4b97188101a9b81f4b6d52b1816dcb508f1c1627cdbeb
S2 = 0x419138af2715f77c0566c491f17405507dd63e7fb6076f2d7d1d87092f3ef25
Z2 = 0xa19d1f3d31d8896ac2626b0f466d0e416ceea61f0f5d935517ab416e08fc9806

Private key, and nonces (k1 and k2) are less than 200 bits. Break it.
?
Activity: -
Merit: -
First of all, I'd like to say that I have a different account on the forum, and I'm creating this one just to stay anonymous.
I know how this sounds. but here me out.
All i need is one of you to generate a public key with a private key which is below 200 bits (just to note, I already done this method on 256 bit keys. I didn't touch any funds).
Sign at least two messages with that public key.
Include your bitcointalk username in one of them.
The more signatures you provide the faster it'll take my computer to compute it.
10 is well more than enough.

I also have a script to generate these, if you want to save time on that, but i recommend not trusting what i say and write your own script.

Edit: when you send the signatures, send them in this format:

R = 0xHexValue
S = 0xHexValue
Z = 0xHexValue

Note: both the nonce and the private key needs to be below 200 bits.
Jump to: