"we ?ust nee? to sim?ly c?eck if the ?rivate ke? is o?d or eve?, the? re?uce the ran?e to ? ?its"
Of course. Anyone can do that, on any public key.
It is possible to generate 32 public keys, where one of them will have 130 bits. But: nobody will know, which one, and it won't make the challenge any easier.
It won't make it any easier, but it will definitely make it a lot harder, for no reason except placebo

Every time some range gets "split" into 2 distinct ranges of size (N/2) each, by whatever means (subtract into two halves, or dividing pubKey by 2) the total solve time increases by a factor of 1.4142. Imagine doing that 35 times in a row. Worst case, divide all bits and end up with what is basically a brute-force O(n) search.

However, there are some dependencies, waiting to be discovered by people, who really understand, how hash functions are internally computed, and which computations can be simplified. Computing four rounds at a time, starting from some hash in the middle, and skipping some single operations like addition, and re-using the same values from previous computations, are just some trivial optimizations, that can be done at the start. But there is more, much more to discover (and obviously, it is much more complex, than comparing just some prefixes, and hoping that vanity generator is all that is needed).
If we treat a public key as a truly random variable the only predictable inputs would be having the first byte (0x2 or 0x3) and the other 31 bytes of the SHA input block (zeros, padding, and bit length).
But these paths are already accounted for and shrinked when, for example, building a GPU kernel. The same goes with all constant precomputable steps, like the initial SHA state and the round state finalization. Even better, this also continues into the RIPEMD step, and even further, when comparing the desired fnal bits with some constant static H160 target. If some useless dependency between these steps exists, the compiler would remove it already.
For example, if one does not care about the first 32 bits of the H160, trust me, that part of the hash is never computed (unless something else depends on it).
That is why I also stated that since the H160 first spits out the MIDDLE 32 bits before the other 128 bits, some hashing steps automatically never execute (and are not part of the kernel at all).
But the truth is disheartning to prefix theorists since the resulting H160s that match in the middle has no pretty base58 similarities whatsoever.