@peakyclin77
Can you share the transaction ID and P2PKH address pairs with the reused nonce k?
However, I have a few questions and points for clarification:
Nonce Recovery: Could you elaborate on the method for recovering the private keys from the signatures that reused nonces? Are there specific algorithms or techniques you recommend for this?
Lattice Attack Viability: You mentioned uncertainty about the order of the fixed bits and the viability of a lattice attack. Do you have any insights or resources that could help clarify this aspect?