It was the Bitcointalk forum that inspired us to create Bitcointalksearch.org - Bitcointalk is an excellent site that should be the default page for anybody dealing in cryptocurrency, since it is a virtual gold-mine of data. However, our experience and user feedback led us create our site; Bitcointalk's search is slow, and difficult to get the results you need, because you need to log in first to find anything useful - furthermore, there are rate limiters for their search functionality.
The aim of our project is to create a faster website that yields more results and faster without having to create an account and eliminate the need to log in - your personal data, therefore, will never be in jeopardy since we are not asking for any of your data and you don't need to provide them to use our site with all of its capabilities.
We created this website with the sole purpose of users being able to search quickly and efficiently in the field of cryptocurrency so they will have access to the latest and most accurate information and thereby assisting the crypto-community at large.
Content | Score | Started by | Date posted | ||
secp256k1 library in pure assembly
n/a
secp256k1 library in pure assembly by n/a
I have done implement parts of secp256k1 in pure asmI would like to inform that…
|
n/a | n/a | |||
secp256k1 library in pure assembly
n/a
secp256k1 library in pure assembly by n/a
I have done implement parts of secp256k1 in pure asmI would like to inform that…
|
n/a | n/a | |||
challenge or task
n/a
challenge or task by n/a
Yes , the last transaction for privatekey 2 -> is tweaked - that true.the questi…
|
n/a | n/a | |||
challenge or task
n/a
challenge or task by n/a
can you share code?dont forget pay to member 1200sure, when it will be work, may…
|
n/a | n/a | |||
challenge or task
n/a
challenge or task by n/a
can you share code?
|
n/a | n/a | |||
Risk of jail for developers. Should you be anonymous?
n/a
Risk of jail for developers. Should you be anonymous? by n/a
The upcoming changes in the financial area in Europe - more precisely, the intro…
|
n/a | n/a | |||
Simple private key to public key converter
n/a
Simple private key to public key converter by n/a
here you have in pure python without any libraryall secp256k1 stepshttp://karpat…
|
n/a | n/a | |||
address 14NWDXkQwcGN1Pd9fboL8npVynD5SfyJAE: not understanding weird transaction
n/a
address 14NWDXkQwcGN1Pd9fboL8npVynD5SfyJAE: not understanding weird transaction by n/a
I have genereate almost about 100 task for find similiar result under testing (g…
|
n/a | n/a | |||
address 14NWDXkQwcGN1Pd9fboL8npVynD5SfyJAE: not understanding weird transaction
n/a
address 14NWDXkQwcGN1Pd9fboL8npVynD5SfyJAE: not understanding weird transaction by n/a
is any way for check that:"When generating k deterministically using RFC6979 you…
|
n/a | n/a | |||
address 14NWDXkQwcGN1Pd9fboL8npVynD5SfyJAE: not understanding weird transaction
n/a
address 14NWDXkQwcGN1Pd9fboL8npVynD5SfyJAE: not understanding weird transaction by n/a
yes, but I'm asking about not private key, but nonce used in transaction.this is…
|
n/a | n/a | |||
"Broken" private key.
n/a
"Broken" private key. by n/a
Q: Posting some lines of code doesn't strengthen the argument, especially when y…
|
n/a | n/a | |||
secp256k1 library in pure assembly
n/a
secp256k1 library in pure assembly by n/a
why you will not use xmm and xmmword? it is 128 bit? less code, less operation,…
|
n/a | n/a | |||
"Broken" private key.
n/a
"Broken" private key. by n/a
with the code everything is ok.becouse you must run it in sagemathhttps://sagece…
|
n/a | n/a | |||
secp256k1 library in pure assembly
n/a
secp256k1 library in pure assembly by n/a
but still it is slower than in pure asm.at the moment I implemented "adding" in…
|
n/a | n/a | |||
secp256k1 library in pure assembly
n/a
secp256k1 library in pure assembly by n/a
in secp256k1 - we have only five main macros:- add - easy implement- substract…
|
n/a | n/a | |||
Secp256k1 Hacks?
n/a
Secp256k1 Hacks? by n/a
Admin, please delete last post of AlexanderCurl , the reason: offering pay-to-b…
|
n/a | n/a | |||
secp256k1 library in pure assembly
n/a
secp256k1 library in pure assembly by n/a
as I see there is no known library for this
|
n/a | n/a | |||
Secp256k1 Hacks?
n/a
Secp256k1 Hacks? by n/a
there are many possibilites to "break" ecdsa or "finding" msb of bits:)To be sur…
|
n/a | n/a | |||
secp256k1 library in pure assembly
n/a
secp256k1 library in pure assembly by n/a
I have check and analyse for comparison : sha256 in pure asm (rewrite by myself)…
|
n/a | n/a | |||
(closed) Development & Technical Discussion |
n/a | ecdsa123 | November 19, 2022, 09:18:54 AM | ||
propably it is security problem of transaction - why it works
n/a
propably it is security problem of transaction - why it works by n/a
yes, it is my code. I can generate a lot of "collisions". for all addresses dire…
|
n/a | n/a | |||
propably it is security problem of transaction - why it works
n/a
propably it is security problem of transaction - why it works by n/a
@Cobras : please don't write any posts where I put questions. What I'm talking a…
|
n/a | n/a | |||
"Broken" private key.
n/a
"Broken" private key. by n/a
I got few questions how I found those second pubkey.Unfornatelly according signe…
|
n/a | n/a | |||
"Broken" private key.
n/a
"Broken" private key. by n/a
No software would take the private key in (tried a dozen), and trying a WiF deco…
|
n/a | n/a | |||
Pollard's kangaroo ECDLP solver
n/a
Pollard's kangaroo ECDLP solver by n/a
what will be time for kangaroo to find privkey on ranges:2**115 bit2**110 bit2**…
|
n/a | n/a | |||
lattice-attack || how to run without error
n/a
lattice-attack || how to run without error by n/a
Firstly if you are talking about lattice attack please be very carefully with de…
|
n/a | n/a | |||
lattice-attack || how to run without error
n/a
lattice-attack || how to run without error by n/a
. Cobras be sure better mathematician than me checked that, and they know that i…
|
n/a | n/a | |||
lattice-attack || how to run without error
n/a
lattice-attack || how to run without error by n/a
page no 18 in pdfCode:Finding the inversion of the nonce. During the computation…
|
n/a | n/a | |||
lattice-attack || how to run without error
n/a
lattice-attack || how to run without error by n/a
@ecdsa, collect some real rsz from blockchain and try your code ?can use 1 trans…
|
n/a | n/a | |||
lattice-attack || how to run without error
n/a
lattice-attack || how to run without error by n/a
no.K is nonce in integer (for testing to know)input are r,s,z generate by script…
|
n/a | n/a | |||
lattice-attack || how to run without error
n/a
lattice-attack || how to run without error by n/a
below output:private key :101391487656071791739308955354353221it is very hard (r…
|
n/a | n/a | |||
lattice-attack || how to run without error
n/a
lattice-attack || how to run without error by n/a
Cobras,it is almost impossible.There could be chance , but implement enviroment…
|
n/a | n/a | |||
lattice-attack || how to run without error
n/a
lattice-attack || how to run without error by n/a
I thin is very hard or inposivle crack with lattice . Method very expesive of…
|
n/a | n/a | |||
lattice-attack || how to run without error
n/a
lattice-attack || how to run without error by n/a
yes,
|
n/a | n/a | |||
lattice-attack || how to run without error
n/a
lattice-attack || how to run without error by n/a
no problem.now I writing my own attack:example :I have pubkey with one output r,…
|
n/a | n/a | |||
lattice-attack || how to run without error
n/a
lattice-attack || how to run without error by n/a
@garlonicon It is possible make fake rsz for known pubkey ?Can someone generate…
|
n/a | n/a | |||
first bitcoin collision?
n/a
first bitcoin collision? by n/a
Code:private=25k_key = 85r=10368879287274847063683326775245528892741533064032799…
|
n/a | n/a |