Search content
Sort by

Showing 2 of 2 results by saelea
Post
Topic
Board Bitcoin Discussion
Re: == Bitcoin challenge transaction: ~1000 BTC total bounty to solvers! ==UPDATED==
by
saelea
on 31/01/2025, 21:59:33 UTC
Do I correctly understand that solving elementary school equation:
x * 55066263022277343669578718895168534326250603453777594175500187360389116729240 mod 115792089237316195423570985008687907853269984665640564039457584007908834671663 = 9210836494447108270027136741376870869791784014198948301625976867708124077590

will make you owner of 1 377 000 USD?
Post
Topic
Board Bitcoin Discussion
Re: == Bitcoin challenge transaction: ~1000 BTC total bounty to solvers! ==UPDATED==
by
saelea
on 02/01/2025, 22:11:01 UTC
I have one question regarding obtaining private key from public key knowing the range of private key from puzzle:

What makes retrieval of private key MUCH faster than bruteforcing when you know public key? No need to perform SHA256 and RIPEMD160 during bruteforce? If only those steps helps to make bruteforcing faster then elliptic curve DLP is questionable. What other hints could be retrieved with public key?