Torin Keepler
Newbie
Offline
Activity: 22
Merit: 0
|
 |
December 05, 2025, 12:20:37 AM |
|
You’ve probably overdosed on ChatGPT. Again, you’ve mixed everything together with no specifics, just the same blah-blah-blah. I explicitly asked you to include in your reply a fragment of the program’s code where, in your opinion, the Gaudry–Schost algorithm is actually used. And for now you’re just flapping around like a horseradish root in a box, and nothing more.
Are you blind, or stupid? Jump table: 1024 points or whatever = CHECKED. Kangaroo for #135 would need only 85 points. Arbitrary jump distances? CHECKED. Kangaroo uses exact distances of powers of two. Side-ways jumps? CHECKED. Kangaroos only jump in one direction, to avoid cycles. Random start distances? CHECKED. Kangaroo uses mid-point starts to minimize expected tame-wild distances. Now, did you actually bother to search and read Pollard's PDF I mentioned? It EXPLICTLY explains the difference between what a Kangaroo algorithm is, and what the Gaudry-Schost philosophy is. Even RetiredCoder explicitly mentioned that his algo is a tweak on the Galbraith paper about EC DLP using a negation map (which in itself is an implementation of Gaudry-Schost). Good luck with your "challenge" or whatever. You're covered by so many red flags at this point that I doubt anyone can take you for real anyway (what's the deal with not even providing the correct SHA256 of that address, since it doesn't expose the pubKey anyway? What are you actually hiding?). You’re trying to derail the discussion by shifting the focus to the public key, even though I already stated very clearly: before the challenge starts, I will inevitably have to reveal it anyway, so that question resolves itself automatically. Moreover, you specifically asked for the SHA-256 hash of that public key - I provided it, and you still have no idea what to do with it. Why did you request it in the first place? But the main point is this: stop evading the topic and provide the exact code fragment where, in your opinion, the Gaudry–Schost algorithm is used in the RCKangaroo program.
|
|
|
|
|
|
kTimesG
|
 |
December 05, 2025, 12:28:07 AM |
|
You’re trying to derail the discussion by shifting the focus to the public key, even though I already stated very clearly: before the challenge starts, I will inevitably have to reveal it anyway, so that question resolves itself automatically. Moreover, you specifically asked for the SHA-256 hash of that public key - I provided it, and you still have no idea what to do with it. Why did you request it in the first place?
But the main point is this: stop evading the topic and provide the exact code fragment where, in your opinion, the Gaudry–Schost algorithm is used in the RCKangaroo program.
Your SHA256 is not checking out to the address you sent funds to. I don't care about the public key at all, did you miss that part? The question was: do YOU possess the PRIVATE KEY? So far, you failed to prove this, and it seems you refuse to do it (validly) even if it is so simple. Whatever, dude. Also, I kinda tried in seven different ways to get some sense into you, but it's ok, you seem to ask for attention, so I'll stop feeding the troll now!
|
Off the grid, training pigeons to broadcast signed messages.
|
|
|
Torin Keepler
Newbie
Offline
Activity: 22
Merit: 0
|
 |
December 05, 2025, 12:39:33 AM Last edit: December 05, 2025, 05:07:12 PM by Torin Keepler |
|
You’re trying to derail the discussion by shifting the focus to the public key, even though I already stated very clearly: before the challenge starts, I will inevitably have to reveal it anyway, so that question resolves itself automatically. Moreover, you specifically asked for the SHA-256 hash of that public key - I provided it, and you still have no idea what to do with it. Why did you request it in the first place?
But the main point is this: stop evading the topic and provide the exact code fragment where, in your opinion, the Gaudry–Schost algorithm is used in the RCKangaroo program.
Your SHA256 is not checking out to the address you sent funds to. I don't care about the public key at all, did you miss that part? The question was: do YOU possess the PRIVATE KEY? So far, you failed to prove this, and it seems you refuse to do it (validly) even if it is so simple. Whatever, dude. Also, I kinda tried in seven different ways to get some sense into you, but it's ok, you seem to ask for attention, so I'll stop feeding the troll now! The birthday paradox is precisely what is used in Pollard’s kangaroo algorithm, since its runtime analysis is based on the probability of a collision between two pseudorandom walks in a group. (In the case of the RCKangaroo implementation, the collisions occur between three herds of kangaroos: one tame and two wild.) You asked for the SHA-256 hash of the public key. I gave it to you. Why did you ask for it? I’ve repeatedly asked you to provide the code block that, according to your claim, uses the Gaudry–Schost algorithm in the RCKangaroo program. You’re just straining the air, and nothing more.
|
|
|
|
|
|
kTimesG
|
 |
December 05, 2025, 12:46:48 AM |
|
And yes, now you’re trying to back out. I’ve repeatedly asked you to provide the code block that, according to your claim, uses the Gaudry–Schost algorithm in the RCKangaroo program.
It's the entire program and algorithm, mister! Maybe you should hunt down Pollard and ask him whether he wrote those words in his paper (where he clearly makes the distinction) with AI or something... I can't advise any one reading this to get involved with whatever "challenge" you're up to. Clearly you're way, way off basic stuff, on multiple subjects. Byez.
|
Off the grid, training pigeons to broadcast signed messages.
|
|
|
Torin Keepler
Newbie
Offline
Activity: 22
Merit: 0
|
 |
December 05, 2025, 12:58:07 AM |
|
And yes, now you’re trying to back out. I’ve repeatedly asked you to provide the code block that, according to your claim, uses the Gaudry–Schost algorithm in the RCKangaroo program.
It's the entire program and algorithm, mister! Maybe you should hunt down Pollard and ask him whether he wrote those words in his paper (where he clearly makes the distinction) with AI or something... I can't advise any one reading this to get involved with whatever "challenge" you're up to. Clearly you're way, way off basic stuff, on multiple subjects. Byez. You truly don’t understand what you’re saying if you claim that the Kangaroo algorithm does not use the Birthday Paradox.
|
|
|
|
|
JackMazzoni
Jr. Member
Offline
Activity: 165
Merit: 6
|
 |
December 05, 2025, 01:26:18 AM |
|
It would we great if someone could post the hardware requirements in each puzzle solve and unsolved based on 4090 gpu or based on ram.
|
Need Wallet Recovery? PM ME. 100% SAFE
|
|
|
|
fixedpaul
|
 |
December 05, 2025, 09:53:31 AM |
|
Has anyone else attempted to quantify the actual keys per second on some of the popular puzzle solving scripts (ie fixedpaul)?
The fixedpaul vanitysearch reports a much higher keys per second than other scripts yet when I attempt to quantify those checks via expected prefix matches per m/keys checked it fails horribly, suggesting in reality it's running at 1% or less than the reported keys per second.
I'm reliably hitting one 1PWo3Je prefix hit approx every 5 billion keys checked on "slower" scripts. Fixedpaul on the other hand is only hitting one 1PWo3J every 80 billion keys, and zero 1PWo3Je's.
I've tested these for weeks on multiple machines getting the same results: Fixedpaul is the fastest if you trust it's keys per second output; and if going by average prefix matches per m/keys checked the fixedpaul produces the least amount of prefix matches.
Prefix matches don't really matter but based on simple probability and averages it's a decent way to benchmark the actual keys checked.
Could you please share more information about the tests you ran? The repository has existed for a year now, and I think that if the speed were really as you said 1% of the reported output, someone would have noticed. I tried running a quick test, comparing it with some “VanitySearch v1.16”, searching for the prefixes 1PWo3Je in the range 20000000000000000:2000000FFFFFFFFFF. I’m copying both logs here: VanitySearch v1.16 Linux with BitCrack integration [keyspace] start=0000000000000000000000000000000000000000000000020000000000000000 [keyspace] end=000000000000000000000000000000000000000000000002000000FFFFFFFFFF Difficulty: 15318045009 Search: 1PWo3Je [Compressed] Current task START time: Fri Dec 5 10:10:28 2025 Number of CPU thread: 0 GPU: GPU #0 NVIDIA GeForce RTX 4090 (128x128 cores) Grid(1024x256) 5285.78 MK/s (GPU 5285.78 MK/s) (2^33.32) [00:00:02 RUN || END 00:03:25][0] Public Addr: 1PWo3JemR25JDWry5vKSGLqquBq6xAVA98 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kf7J7LdSnfT8nTa Priv (HEX): 0x000000000000000000000000000000000000000000000002000000128D725C59
Public Addr: 1PWo3Je2w5aecwYbZdsGQ7ze2fErLULPQf Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kejsvena7afPLAV Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000BFADF5CF4
Public Addr: 1PWo3JegNEK3ayZNTkA9rwfrapcyUPmttW Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfM4iQtA17wCgpR Priv (HEX): 0x00000000000000000000000000000000000000000000000200000016C72E01B1
Public Addr: 1PWo3JeHF4QfW8MuyEWdj7x5ybpd6DZURe Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfLAiKeAWjkjk28 Priv (HEX): 0x0000000000000000000000000000000000000000000000020000001680BDFB01 5329.68 MK/s (GPU 5329.68 MK/s) (2^34.92) [00:00:06 RUN || END 00:03:20][4] Public Addr: 1PWo3JeMNcD4GY2gxYAxqz4DqpsoEeh77n Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfGe6s4Jw27BDhR Priv (HEX): 0x000000000000000000000000000000000000000000000002000000156B971536
Public Addr: 1PWo3Jewkh71KfvWF5ky9TZwvC77mWNTB2 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4keduBCdNSRhyASz Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000A2530DA88 5358.18 MK/s (GPU 5358.18 MK/s) (2^35.67) [00:00:10 RUN || END 00:03:15][6] Public Addr: 1PWo3Je8pVETQTD8jTukwVCex4K711GiDW Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kekBQrxPTGUTwvT Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000C128EED6A
Public Addr: 1PWo3JexCfDsYENDp8iw71BMz8nWXUubed Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kf8wsQe2L5uPs4L Priv (HEX): 0x000000000000000000000000000000000000000000000002000000130F27F874
Public Addr: 1PWo3JeKEkqv7SXzpFYzgFuQtBUfMVMV7Q Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ker1vxBJtPfkRXa Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000DDD177B6D 5374.58 MK/s (GPU 5374.58 MK/s) (2^36.15) [00:00:14 RUN || END 00:03:10][9] Public Addr: 1PWo3JeNyJHprvMyG83MJ2w7rqtM4dQTr2 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kerT1aGPjn3ZJ1q Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000DFF10199D 5399.01 MK/s (GPU 5399.01 MK/s) (2^36.52) [00:00:18 RUN || END 00:03:05][10] Public Addr: 1PWo3JegduHkrk556eofwDvT68GbZ9J6kS Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kg5YsyLqLs3XPaE Priv (HEX): 0x00000000000000000000000000000000000000000000000200000023D0F62EAE 5167.65 MK/s (GPU 5167.65 MK/s) (2^36.62) [00:00:20 RUN || END 00:03:12][11] Public Addr: 1PWo3JeKBLqaCKwSXw3Va2ZjSVLv6ED3od Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kgRDyBFoZbZ5BRP Priv (HEX): 0x00000000000000000000000000000000000000000000000200000029DA99B6DC 5183.81 MK/s (GPU 5183.81 MK/s) (2^36.76) [00:00:22 RUN || END 00:03:09][12] Public Addr: 1PWo3JefkKPeib2LsGg4ZGAxbdDvub4jDa Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kgSBU8qQVpfibQU Priv (HEX): 0x0000000000000000000000000000000000000000000000020000002A25C69BBC 5187.87 MK/s (GPU 5187.87 MK/s) (2^37.01) [00:00:26 RUN || END 00:03:05][13] Public Addr: 1PWo3Je3zaYTVTY7do4g1k2P3CZdP24p3L Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfetJoaNMqvfABY Priv (HEX): 0x0000000000000000000000000000000000000000000000020000001C3F360535 5203.97 MK/s (GPU 5203.97 MK/s) (2^37.23) [00:00:30 RUN || END 00:03:00][14] Public Addr: 1PWo3JeuZ5SjzYp8SYicx2Mu5hgKaqxKhk Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfp7C1QdXTcxDXd Priv (HEX): 0x0000000000000000000000000000000000000000000000020000001F13B9A373 5203.67 MK/s (GPU 5203.67 MK/s) (2^37.32) [00:00:32 RUN || END 00:02:58][15] Public Addr: 1PWo3JeH1TSwSMtW5Mk8JaUzZBtPEJsCPx Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kgQDvkyw7jrMYQt Priv (HEX): 0x000000000000000000000000000000000000000000000002000000298BFB368A 5200.89 MK/s (GPU 5200.89 MK/s) (2^37.55) [00:00:38 RUN || END 00:02:52][16] Public Addr: 1PWo3JeRfVg3RjFL9aM2Sb8EcBHxGuZXTq Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kgrmBuK6RKYbCy5 Priv (HEX): 0x00000000000000000000000000000000000000000000000200000031B0F46166 5200.59 MK/s (GPU 5200.59 MK/s) (2^37.63) [00:00:40 RUN || END 00:02:50][17] Public Addr: 1PWo3JeEiEjz13PeJZPev326NSh4gnKV2w Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4khzB3Pt8nA8EKDA Priv (HEX): 0x00000000000000000000000000000000000000000000000200000045C3D6778F 5183.74 MK/s (GPU 5183.74 MK/s) (2^37.90) [00:00:48 RUN || END 00:02:42][18] Public Addr: 1PWo3JeZKq6oi7uokhshHWP8eUN8o5EE8k Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4khQ6iXsGvHBntQU Priv (HEX): 0x0000000000000000000000000000000000000000000000020000003B4ED93BDF 5414.90 MK/s (GPU 5414.90 MK/s) (2^38.07) [00:00:54 RUN || END 00:02:29][19] Public Addr: 1PWo3Je2muLW8JF2ZVHUKkYetpuoVLU6yD Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kghCJnFGFZNxWGK Priv (HEX): 0x0000000000000000000000000000000000000000000000020000002EC15A1116 5415.35 MK/s (GPU 5415.35 MK/s) (2^38.13) [00:00:56 RUN || END 00:02:27][20] Public Addr: 1PWo3JeTQheUtU64LbNTHasBvuuD4YzvLj Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjDf89M9rbx5Fdd Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005BB3D31993 5184.33 MK/s (GPU 5184.33 MK/s) (2^38.16) [00:00:58 RUN || END 00:02:32][21] Public Addr: 1PWo3JeS3GLD5na3W3ycfMib47gxq3QptD Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjFKqNN2W7Hbe1c Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005C36D27621 5184.27 MK/s (GPU 5184.27 MK/s) (2^38.26) [00:01:03 RUN || END 00:02:28][22] Public Addr: 1PWo3Jewsm26TR5agk5YVyGDGkpFaerVwP Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kj2aiZAj22ksV29 Priv (HEX): 0x000000000000000000000000000000000000000000000002000000584DAA91F5 5184.27 MK/s (GPU 5184.27 MK/s) (2^38.36) [00:01:07 RUN || END 00:02:24][23] Public Addr: 1PWo3Jedwac7qvLEy3jYmWzeqSjit72TMZ Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ki784H45AhDFXu9 Priv (HEX): 0x00000000000000000000000000000000000000000000000200000047E5BBC1D5 5184.23 MK/s (GPU 5184.23 MK/s) (2^38.40) [00:01:09 RUN || END 00:02:22][24] Public Addr: 1PWo3JearhKNBnvyKhLZ4zkHp8BUsAJAZ8 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kiuGmi277VzcFV5 Priv (HEX): 0x000000000000000000000000000000000000000000000002000000560F6B74ED
Public Addr: 1PWo3JekDpiCiUvRG3KNT4X8j557M63cLA Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kijaFDeVM1NhVvd Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005315766C3C
Public Addr: 1PWo3Je7mwXX8JNttLhb3pucZxcArmjVnh Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kiV1CkBohwVSULZ Priv (HEX): 0x0000000000000000000000000000000000000000000000020000004E9CD3FD62 5200.33 MK/s (GPU 5200.33 MK/s) (2^38.44) [00:01:11 RUN || END 00:02:19][27] Public Addr: 1PWo3JeUTADQ16CevGQ5DELCvSJGXt5r6S Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjJbDR3z57QKU3g Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005D3757C8B0 5431.37 MK/s (GPU 5431.37 MK/s) (2^38.53) [00:01:15 RUN || END 00:02:09][28] Public Addr: 1PWo3JeSm93uvPTBMe4DMsdRo1c2v8oV91 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kiquNf1X2949uGi Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005506BF9104 5200.08 MK/s (GPU 5200.08 MK/s) (2^38.59) [00:01:19 RUN || END 00:02:11][29] Public Addr: 1PWo3JeHbgMvwVxbRzFbC5qwNeLM1KXK6F Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kkBoLrHnFJVdmns Priv (HEX): 0x0000000000000000000000000000000000000000000000020000006CEE777C5D 5199.89 MK/s (GPU 5199.89 MK/s) (2^38.63) [00:01:21 RUN || END 00:02:09][30] Public Addr: 1PWo3JepgC86tBLWV5cCdimg5p1TCLpQxi Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjRnHMXHBjXg4DL Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005F6C45FB15 5200.11 MK/s (GPU 5200.11 MK/s) (2^38.67) [00:01:23 RUN || END 00:02:07][31] Public Addr: 1PWo3JerAEen8VMQb5tmXBUU7rVCgrwd32 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjRj3PmwK1gHG8b Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005F67E23C04 5200.13 MK/s (GPU 5200.13 MK/s) (2^38.70) [00:01:25 RUN || END 00:02:05][32] Public Addr: 1PWo3Je2crkWDmyd9dDX7aiTfEBkAA2qdt Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjcoYGswJCemKVS Priv (HEX): 0x00000000000000000000000000000000000000000000000200000062CE2A66D7 5169.30 MK/s (GPU 5169.30 MK/s) (2^38.77) [00:01:29 RUN || END 00:02:01][33] Public Addr: 1PWo3JeEwBnrj4XA4CNgbzrR6h5Dp3WGnz Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kkNcwW7LticvphP Priv (HEX): 0x000000000000000000000000000000000000000000000002000000704090C3ED
Public Addr: 1PWo3JeM3aMVBTmdfFFt7pkQxdPpVgyJcW Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kkWRH97C3zc2d3Y Priv (HEX): 0x00000000000000000000000000000000000000000000000200000072A5456555 5393.63 MK/s (GPU 5393.63 MK/s) (2^38.84) [00:01:33 RUN || END 00:01:52][35] Public Addr: 1PWo3JeCNyne35RYP8JPTvWpjUx1haqggb Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjtGnx3jQKQFCZX Priv (HEX): 0x000000000000000000000000000000000000000000000002000000678D854556 5164.09 MK/s (GPU 5164.09 MK/s) (2^38.89) [00:01:37 RUN || END 00:01:54][36] Public Addr: 1PWo3JeXwdo9buxC5HYnksVH6hoJGKqhDe Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kmWaagyysSwAkrf Priv (HEX): 0x000000000000000000000000000000000000000000000002000000847E81955B
Public Addr: 1PWo3JeGKzTn8x5VstZw77WctBjxFqfVnW Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4km16iRSRnywCubg Priv (HEX): 0x0000000000000000000000000000000000000000000000020000007B7271552C 5170.96 MK/s (GPU 5170.96 MK/s) (2^38.98) [00:01:43 RUN || END 00:01:47][38] Public Addr: 1PWo3Jeh956tujCUiVydBMRLEmVzGFQYtL Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4km4Wqyicp7ivGXT Priv (HEX): 0x0000000000000000000000000000000000000000000000020000007C7ED0DC3C 5164.96 MK/s (GPU 5164.96 MK/s) (2^39.04) [00:01:47 RUN || END 00:01:43][39] Public Addr: 1PWo3JevBoWspcTsnvVYCx2Hq9Sej1rW8U Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4km8CSNLJsDZCMLJ Priv (HEX): 0x0000000000000000000000000000000000000000000000020000007DA0223450 5154.73 MK/s (GPU 5154.73 MK/s) (2^39.06) [00:01:49 RUN || END 00:01:41][40] Public Addr: 1PWo3JeLDcwhRmbEkJPCyskyBui3EwvRER Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kkpBsixfvr5q6nC Priv (HEX): 0x00000000000000000000000000000000000000000000000200000078193E4829 5220.71 MK/s (GPU 5220.71 MK/s) (2^39.09) [00:01:51 RUN || END 00:01:38][41] Public Addr: 1PWo3JeJS9ZEYArbbW9XzCvstJdyfV6gug Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4km5UGSXNTrxTA6X Priv (HEX): 0x0000000000000000000000000000000000000000000000020000007CC9E2DFBC 5368.96 MK/s (GPU 5368.96 MK/s) (2^39.12) [00:01:53 RUN || END 00:01:33][42] Public Addr: 1PWo3Je1NkW54CRFCBngUHwwZCFpKDDK2m Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knaU61oFsaVobvJ Priv (HEX): 0x000000000000000000000000000000000000000000000002000000977C982FAD 5156.67 MK/s (GPU 5156.67 MK/s) (2^39.13) [00:01:55 RUN || END 00:01:36][43] Public Addr: 1PWo3JefKEBDixWNeymPmWtNBsBgDAeR2R Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kmyhKJnQB4ShdMP Priv (HEX): 0x0000000000000000000000000000000000000000000000020000008CD0D2102F
Public Addr: 1PWo3JevCHbRL4KoR71WR3RBkezFL5AmbD Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kn9dEpZ3yJ9aPXf Priv (HEX): 0x0000000000000000000000000000000000000000000000020000008FDCEC9EE4
Public Addr: 1PWo3JeYS9VYJ576fq1Ff2FyJ98cfB7dXj Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knB1GysuAqkbx3W Priv (HEX): 0x000000000000000000000000000000000000000000000002000000904956495D 5139.29 MK/s (GPU 5139.29 MK/s) (2^39.16) [00:01:57 RUN || END 00:01:34][46] Public Addr: 1PWo3Je5pkEwDZbkLnY4ssg7sBccQVtQ4g Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knpGLkSB76Uevw8 Priv (HEX): 0x0000000000000000000000000000000000000000000000020000009BB88FC1A9 5119.75 MK/s (GPU 5119.75 MK/s) (2^39.23) [00:02:03 RUN || END 00:01:28][47] Public Addr: 1PWo3JeaySN7L9BJCPAyMqsLLoGmefPVNm Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knG96PiwvnULnUg Priv (HEX): 0x00000000000000000000000000000000000000000000000200000091DCBD43A4 5122.55 MK/s (GPU 5122.55 MK/s) (2^39.28) [00:02:07 RUN || END 00:01:24][48] Public Addr: 1PWo3JewLk1m1L2PYeM5Y9Bk8pM8BcBd67 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ko8zt9LtPmS82ds Priv (HEX): 0x000000000000000000000000000000000000000000000002000000A178501A10
Public Addr: 1PWo3JeVFjnLzneKD7ruPPYS9af9CXT2NC Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knpDs3LBL6FZeoe Priv (HEX): 0x0000000000000000000000000000000000000000000000020000009BB5349414 5129.08 MK/s (GPU 5129.08 MK/s) (2^39.31) [00:02:09 RUN || END 00:01:21][50] Public Addr: 1PWo3Je8CUY5byN647YyHeozqiXhuUMPWm Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knu2L4fUJWvwFAN Priv (HEX): 0x0000000000000000000000000000000000000000000000020000009D2E653C59 5059.74 MK/s (GPU 5059.74 MK/s) (2^39.36) [00:02:16 RUN || END 00:01:17][51] Public Addr: 1PWo3JeXPnaDXJVM7BJFFdGsZinKVPjzAj Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4koavkLhSj3D5kVr Priv (HEX): 0x000000000000000000000000000000000000000000000002000000A96D577EF4 5048.26 MK/s (GPU 5048.26 MK/s) (2^39.41) [00:02:20 RUN || END 00:01:13][52] Public Addr: 1PWo3JeGdk3H1coTdB4E1HAAigMWkMM57k Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kp4aFDPoBYfQdJ5 Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B1E95359A9 5032.03 MK/s (GPU 5032.03 MK/s) (2^39.43) [00:02:22 RUN || END 00:01:11][53] Public Addr: 1PWo3JeeR5aZdF3jTCSBXUeD7JjhubkJjT Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpK6rMvcvb9RFSB Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B65EA8D922
Public Addr: 1PWo3Jej7pQyXkdY36JcKGLJNKSPbta4QR Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpN1BJvhfwLVtw3 Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B742A9B3CE 5003.69 MK/s (GPU 5003.69 MK/s) (2^39.45) [00:02:24 RUN || END 00:01:09][55] Public Addr: 1PWo3Jed442wzBXPWBnAWJkxsM7e8AaGvh Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4koXyBh7u9Tayvpk Priv (HEX): 0x000000000000000000000000000000000000000000000002000000A884F47589 5016.12 MK/s (GPU 5016.12 MK/s) (2^39.47) [00:02:26 RUN || END 00:01:07][56] Public Addr: 1PWo3JeYDRPnUzjaf7azEnEA2Gg6tzh7HV Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4koimrKFimgJB1gG Priv (HEX): 0x000000000000000000000000000000000000000000000002000000ABD5CAB855 5070.22 MK/s (GPU 5070.22 MK/s) (2^39.49) [00:02:28 RUN || END 00:01:04][57] Public Addr: 1PWo3JeorcGmYVVVGtpb8HjT7b9t8BhsTg Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpLX3b1faDYi2da Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B6CDFE3A61 5104.07 MK/s (GPU 5104.07 MK/s) (2^39.51) [00:02:30 RUN || END 00:01:02][58] Public Addr: 1PWo3JeP7PHTpzcUiRvyECjszLfeutAdVN Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpSH5VHqCv4Bj8U Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B89273375B 5343.35 MK/s (GPU 5343.35 MK/s) (2^39.53) [00:02:32 RUN || END 00:00:57][59] Public Addr: 1PWo3Jewqu9jfFk7zRsnDKCShr3zeuU36R Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpUbhyvriQsbXSg Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B948CF2675 5128.47 MK/s (GPU 5128.47 MK/s) (2^39.54) [00:02:34 RUN || END 00:00:58][60] Public Addr: 1PWo3JePFTQ9WxaXZWZu7ZNB3frktDjyAF Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kq45U8Ewi3vY1yD Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C38EFAF394 5109.17 MK/s (GPU 5109.17 MK/s) (2^39.56) [00:02:36 RUN || END 00:00:56][61] Public Addr: 1PWo3Je2WbBGoCo3VtWtKfApGwUYLVSoSh Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqJCSmR3JeEU3JA Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C7E44EBA7B 5135.31 MK/s (GPU 5135.31 MK/s) (2^39.60) [00:02:40 RUN || END 00:00:51][62] Public Addr: 1PWo3JedQxvrgmQ7rDUxQL3P9KuhzArauv Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpyPfYRAprTabVJ Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C21ED0AAB6 5148.55 MK/s (GPU 5148.55 MK/s) (2^39.62) [00:02:42 RUN || END 00:00:49][63] Public Addr: 1PWo3JesheDWC3kipKnAQreArtjVnUQz4p Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqQj8yFkeUKpDUP Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C9E5422006 5138.57 MK/s (GPU 5138.57 MK/s) (2^39.64) [00:02:44 RUN || END 00:00:47][64] Public Addr: 1PWo3JeLXdHd8q1Sjo169aUXoLkAd39RDq Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqFHyUDHYxrMKEa Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C7001BF68A
Public Addr: 1PWo3JeGvmbp1FTF4FExWA41tjXNRoiUea Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqGrdjeYjWp57Wk Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C77AE9150B 5143.62 MK/s (GPU 5143.62 MK/s) (2^39.66) [00:02:46 RUN || END 00:00:45][66] Public Addr: 1PWo3Je5aYoc1d4H3JKpoHB46LdVNQpPvE Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqbaSicakQU8kgA Priv (HEX): 0x000000000000000000000000000000000000000000000002000000CD39ABDBA1 5360.41 MK/s (GPU 5360.41 MK/s) (2^39.69) [00:02:50 RUN || END 00:00:39][67] Public Addr: 1PWo3JeKjSQTYZdh5joG42hKyz4eneG9U3 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqfc91iR8pQfNXm Priv (HEX): 0x000000000000000000000000000000000000000000000002000000CE7637B12A 5373.64 MK/s (GPU 5373.64 MK/s) (2^39.71) [00:02:52 RUN || END 00:00:37][68] Public Addr: 1PWo3JeX4DMwSXRVUAe933zF2D33xJxLjq Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqvnGzMBfUQAfu7 Priv (HEX): 0x000000000000000000000000000000000000000000000002000000D31E639A34
Public Addr: 1PWo3JeFkJEVzFX17PTLaNqr8LrTzZB6NS Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ksAHb4VqXXnVES5 Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E9100AA472 5146.46 MK/s (GPU 5146.46 MK/s) (2^39.72) [00:02:54 RUN || END 00:00:37][70] Public Addr: 1PWo3Jese8NnywVYLo4S7dDtAjt9XgVvSa Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kr4KZAsF1ssNr9A Priv (HEX): 0x000000000000000000000000000000000000000000000002000000D56EB22D6B 5122.24 MK/s (GPU 5122.24 MK/s) (2^39.77) [00:03:00 RUN || END 00:00:31][71] Public Addr: 1PWo3Jep5QuFC1S8Jd27qjoTT24PWVCfyt Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krQcbmpLAZst6ac Priv (HEX): 0x000000000000000000000000000000000000000000000002000000DBA9097C08
Public Addr: 1PWo3Jefstug95HjcJZkBTKC18gXwLX5fw Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ks1cRwNhdC1nMc5 Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E6668026A0
Public Addr: 1PWo3Je5W5hnnTPThPp1TMy45R5HxDv9pZ Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kro6MMrZsLsVTdE Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E28F017F77
Public Addr: 1PWo3Jedxd1Kgq4zMDpvVaeoje92G42FVK Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krihoaAHoXDTUn5 Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E1363693DF
Public Addr: 1PWo3JeaUpFZNbcHyHD2MQK9jFCvN4iHTa Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krYNpc6czAr4kVN Priv (HEX): 0x000000000000000000000000000000000000000000000002000000DE0ADFE8BD 5114.45 MK/s (GPU 5114.45 MK/s) (2^39.82) [00:03:06 RUN || END 00:00:25][76] Public Addr: 1PWo3JeR6NAkim3QyE8FcnmxmhCk8eHTAi Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krWrhpEEMYjoMv9 Priv (HEX): 0x000000000000000000000000000000000000000000000002000000DD93847CB4
Public Addr: 1PWo3JefV9tbr6TkNmDfXsqZYYgtnrGbL6 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ks6eGDcGev4DZDQ Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E7F1CBC437
Public Addr: 1PWo3JeL6QYumwQZuHE89Hj2ymLxgv1KYN Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqxC2J88RADUkVE Priv (HEX): 0x000000000000000000000000000000000000000000000002000000D38D1E0588
Public Addr: 1PWo3JeVHTeUQnzjec6cr34WP1sT86fsCC Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ks61xdp1BCENUSA Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E7C09F4F55 5113.83 MK/s (GPU 5113.83 MK/s) (2^39.84) [00:03:08 RUN || END 00:00:22][80] Public Addr: 1PWo3JewLj7CrHTkk3PQMUp8BoLKbNfUA4 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krkqE6Z6T6gqmWy Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E1DD6498AE 5157.78 MK/s (GPU 5157.78 MK/s) (2^39.89) [00:03:17 RUN || END 00:00:14][81] Public Addr: 1PWo3JeGG9ZD9yHpsoUEtCP8WZCKMf7xC8 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ksubNeAUuwfhkhX Priv (HEX): 0x000000000000000000000000000000000000000000000002000000F65A53DC8D
Public Addr: 1PWo3JeynV1d7VSYmEqsD7DoxpVvnop4rT Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ksUVdjaUieAQAue Priv (HEX): 0x000000000000000000000000000000000000000000000002000000EEA67C7EA0
Public Addr: 1PWo3JekQFTr9qgXjsyPjVneTpX2Qc2mB9 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kt7Xjnk1WoYfD6n Priv (HEX): 0x000000000000000000000000000000000000000000000002000000FA0427C321 5168.56 MK/s (GPU 5168.56 MK/s) (2^39.96) [00:03:25 RUN || END 00:00:06][84] Public Addr: 1PWo3JeVbnYoxBs9cjrDgVAQznyiqpPTFB Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kse13QRzeYP8NVE Priv (HEX): 0x000000000000000000000000000000000000000000000002000000F1916267EA 5380.98 MK/s (GPU 5380.98 MK/s) (2^40.00) [00:03:31 RUN || END 00:00:00][85] Public Addr: 1PWo3JeWL6TpWqMDNaFvBussA6vW4S8Bz2 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kt2miuBtD6dNCXf Priv (HEX): 0x000000000000000000000000000000000000000000000002000000F88E48DE89
Public Addr: 1PWo3Je9Jc7wiMvUoH571GXZdgd1Ew4M7c Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kuSaAkDsohm6R6S Priv (HEX): 0x00000000000000000000000000000000000000000000000200000111A8C5B6DF [EXIT] Range research completed (2^40.01) [00:03:33 RUN || END ...finishing][87] Current task END time: Fri Dec 5 10:14:03 2025
VanitySearch-Bitcrack v2.2 by FixedPaul [keyspace] range=2^40 [keyspace] start=20000000000000000 [keyspace] end=2000000FFFFFFFFFF Search: 1PWo3Je [Compressed] Current task START time: Fri Dec 5 10:16:29 2025 GPU: GPU #0 NVIDIA GeForce RTX 4090 (128x128 cores) Grid(16384x256) Starting keys set in 0.60 seconds 6880.8 MK/s - 26 BKeys - 2^34.58 [2.34%] - RUN: 00:00:03.6|END: 00:02:31.1 - Found: 0 Public Addr: 1PWo3JeNyJHprvMyG83MJ2w7rqtM4dQTr2 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kerT1aGPjn3ZJ1q Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000DFF10199D
Public Addr: 1PWo3JewLk1m1L2PYeM5Y9Bk8pM8BcBd67 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ko8zt9LtPmS82ds Priv (HEX): 0x000000000000000000000000000000000000000000000002000000A178501A10
7193.2 MK/s - 39 BKeys - 2^35.17 [3.52%] - RUN: 00:00:05.4|END: 00:02:29.7 - Found: 2 Public Addr: 1PWo3Jefstug95HjcJZkBTKC18gXwLX5fw Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ks1cRwNhdC1nMc5 Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E6668026A0
7177.3 MK/s - 47 BKeys - 2^35.46 [4.30%] - RUN: 00:00:06.6|END: 00:02:28.0 - Found: 3 Public Addr: 1PWo3Je1NkW54CRFCBngUHwwZCFpKDDK2m Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knaU61oFsaVobvJ Priv (HEX): 0x000000000000000000000000000000000000000000000002000000977C982FAD
6816.8 MK/s - 103 BKeys - 2^36.58 [9.38%] - RUN: 00:00:14.6|END: 00:02:21.8 - Found: 4 Public Addr: 1PWo3JeRfVg3RjFL9aM2Sb8EcBHxGuZXTq Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kgrmBuK6RKYbCy5 Priv (HEX): 0x00000000000000000000000000000000000000000000000200000031B0F46166
7194.9 MK/s - 125 BKeys - 2^36.86 [11.33%] - RUN: 00:00:17.6|END: 00:02:18.3 - Found: 5 Public Addr: 1PWo3Jed442wzBXPWBnAWJkxsM7e8AaGvh Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4koXyBh7u9Tayvpk Priv (HEX): 0x000000000000000000000000000000000000000000000002000000A884F47589
7170.7 MK/s - 133 BKeys - 2^36.95 [12.11%] - RUN: 00:00:18.8|END: 00:02:16.9 - Found: 6 Public Addr: 1PWo3JeR6NAkim3QyE8FcnmxmhCk8eHTAi Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krWrhpEEMYjoMv9 Priv (HEX): 0x000000000000000000000000000000000000000000000002000000DD93847CB4
Public Addr: 1PWo3JeynV1d7VSYmEqsD7DoxpVvnop4rT Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ksUVdjaUieAQAue Priv (HEX): 0x000000000000000000000000000000000000000000000002000000EEA67C7EA0
7217.3 MK/s - 159 BKeys - 2^37.21 [14.45%] - RUN: 00:00:22.4|END: 00:02:12.8 - Found: 8 Public Addr: 1PWo3JeVFjnLzneKD7ruPPYS9af9CXT2NC Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knpDs3LBL6FZeoe Priv (HEX): 0x0000000000000000000000000000000000000000000000020000009BB5349414
7230.9 MK/s - 163 BKeys - 2^37.25 [14.84%] - RUN: 00:00:23.0|END: 00:02:12.1 - Found: 9 Public Addr: 1PWo3JewLj7CrHTkk3PQMUp8BoLKbNfUA4 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krkqE6Z6T6gqmWy Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E1DD6498AE
7187.6 MK/s - 168 BKeys - 2^37.29 [15.23%] - RUN: 00:00:23.6|END: 00:02:11.4 - Found: 10 Public Addr: 1PWo3JevCHbRL4KoR71WR3RBkezFL5AmbD Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kn9dEpZ3yJ9aPXf Priv (HEX): 0x0000000000000000000000000000000000000000000000020000008FDCEC9EE4
7215.2 MK/s - 180 BKeys - 2^37.39 [16.41%] - RUN: 00:00:25.4|END: 00:02:09.5 - Found: 11 Public Addr: 1PWo3JedQxvrgmQ7rDUxQL3P9KuhzArauv Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpyPfYRAprTabVJ Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C21ED0AAB6
7198.3 MK/s - 206 BKeys - 2^37.58 [18.75%] - RUN: 00:00:28.9|END: 00:02:05.6 - Found: 12 Public Addr: 1PWo3JeEwBnrj4XA4CNgbzrR6h5Dp3WGnz Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kkNcwW7LticvphP Priv (HEX): 0x000000000000000000000000000000000000000000000002000000704090C3ED
7061.6 MK/s - 232 BKeys - 2^37.75 [21.09%] - RUN: 00:00:32.6|END: 00:02:02.0 - Found: 13 Public Addr: 1PWo3Jewkh71KfvWF5ky9TZwvC77mWNTB2 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4keduBCdNSRhyASz Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000A2530DA88
Public Addr: 1PWo3JeeR5aZdF3jTCSBXUeD7JjhubkJjT Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpK6rMvcvb9RFSB Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B65EA8D922
7028.0 MK/s - 236 BKeys - 2^37.78 [21.48%] - RUN: 00:00:33.2|END: 00:02:01.4 - Found: 15 Public Addr: 1PWo3Jeh956tujCUiVydBMRLEmVzGFQYtL Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4km4Wqyicp7ivGXT Priv (HEX): 0x0000000000000000000000000000000000000000000000020000007C7ED0DC3C
Public Addr: 1PWo3JeWL6TpWqMDNaFvBussA6vW4S8Bz2 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kt2miuBtD6dNCXf Priv (HEX): 0x000000000000000000000000000000000000000000000002000000F88E48DE89
7125.9 MK/s - 296 BKeys - 2^38.11 [26.95%] - RUN: 00:00:41.6|END: 00:01:53.0 - Found: 17 Public Addr: 1PWo3JeGvmbp1FTF4FExWA41tjXNRoiUea Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqGrdjeYjWp57Wk Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C77AE9150B
7161.5 MK/s - 335 BKeys - 2^38.29 [30.47%] - RUN: 00:00:47.1|END: 00:01:47.4 - Found: 18 Public Addr: 1PWo3JeZKq6oi7uokhshHWP8eUN8o5EE8k Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4khQ6iXsGvHBntQU Priv (HEX): 0x0000000000000000000000000000000000000000000000020000003B4ED93BDF
7131.6 MK/s - 339 BKeys - 2^38.30 [30.86%] - RUN: 00:00:47.7|END: 00:01:46.8 - Found: 19 Public Addr: 1PWo3Je8CUY5byN647YyHeozqiXhuUMPWm Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knu2L4fUJWvwFAN Priv (HEX): 0x0000000000000000000000000000000000000000000000020000009D2E653C59
7189.4 MK/s - 344 BKeys - 2^38.32 [31.25%] - RUN: 00:00:48.3|END: 00:01:46.2 - Found: 20 Public Addr: 1PWo3JeaySN7L9BJCPAyMqsLLoGmefPVNm Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knG96PiwvnULnUg Priv (HEX): 0x00000000000000000000000000000000000000000000000200000091DCBD43A4
7145.8 MK/s - 348 BKeys - 2^38.34 [31.64%] - RUN: 00:00:48.9|END: 00:01:45.6 - Found: 21 Public Addr: 1PWo3JeCNyne35RYP8JPTvWpjUx1haqggb Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjtGnx3jQKQFCZX Priv (HEX): 0x000000000000000000000000000000000000000000000002000000678D854556
7181.5 MK/s - 365 BKeys - 2^38.41 [33.20%] - RUN: 00:00:51.3|END: 00:01:43.2 - Found: 22 Public Addr: 1PWo3JeGKzTn8x5VstZw77WctBjxFqfVnW Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4km16iRSRnywCubg Priv (HEX): 0x0000000000000000000000000000000000000000000000020000007B7271552C
7161.6 MK/s - 382 BKeys - 2^38.48 [34.77%] - RUN: 00:00:53.6|END: 00:01:40.7 - Found: 23 Public Addr: 1PWo3JeM3aMVBTmdfFFt7pkQxdPpVgyJcW Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kkWRH97C3zc2d3Y Priv (HEX): 0x00000000000000000000000000000000000000000000000200000072A5456555
7171.5 MK/s - 408 BKeys - 2^38.57 [37.11%] - RUN: 00:00:57.2|END: 00:01:37.0 - Found: 24 Public Addr: 1PWo3Jep5QuFC1S8Jd27qjoTT24PWVCfyt Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krQcbmpLAZst6ac Priv (HEX): 0x000000000000000000000000000000000000000000000002000000DBA9097C08
Public Addr: 1PWo3Je5W5hnnTPThPp1TMy45R5HxDv9pZ Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kro6MMrZsLsVTdE Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E28F017F77
7157.9 MK/s - 434 BKeys - 2^38.66 [39.45%] - RUN: 00:01:00.8|END: 00:01:33.4 - Found: 26 Public Addr: 1PWo3JeXwdo9buxC5HYnksVH6hoJGKqhDe Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kmWaagyysSwAkrf Priv (HEX): 0x000000000000000000000000000000000000000000000002000000847E81955B
7165.3 MK/s - 447 BKeys - 2^38.70 [40.63%] - RUN: 00:01:02.6|END: 00:01:31.6 - Found: 27 Public Addr: 1PWo3JeuZ5SjzYp8SYicx2Mu5hgKaqxKhk Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfp7C1QdXTcxDXd Priv (HEX): 0x0000000000000000000000000000000000000000000000020000001F13B9A373
7167.3 MK/s - 464 BKeys - 2^38.75 [42.19%] - RUN: 00:01:05.0|END: 00:01:29.2 - Found: 28 Public Addr: 1PWo3Jej7pQyXkdY36JcKGLJNKSPbta4QR Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpN1BJvhfwLVtw3 Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B742A9B3CE
7168.3 MK/s - 468 BKeys - 2^38.77 [42.58%] - RUN: 00:01:05.6|END: 00:01:28.5 - Found: 29 Public Addr: 1PWo3JeKBLqaCKwSXw3Va2ZjSVLv6ED3od Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kgRDyBFoZbZ5BRP Priv (HEX): 0x00000000000000000000000000000000000000000000000200000029DA99B6DC
7155.3 MK/s - 541 BKeys - 2^38.98 [49.22%] - RUN: 00:01:15.9|END: 00:01:18.3 - Found: 30 Public Addr: 1PWo3JeHF4QfW8MuyEWdj7x5ybpd6DZURe Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfLAiKeAWjkjk28 Priv (HEX): 0x0000000000000000000000000000000000000000000000020000001680BDFB01
Public Addr: 1PWo3JepgC86tBLWV5cCdimg5p1TCLpQxi Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjRnHMXHBjXg4DL Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005F6C45FB15
7132.2 MK/s - 550 BKeys - 2^39.00 [50.00%] - RUN: 00:01:17.1|END: 00:01:17.1 - Found: 32 Public Addr: 1PWo3JegNEK3ayZNTkA9rwfrapcyUPmttW Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfM4iQtA17wCgpR Priv (HEX): 0x00000000000000000000000000000000000000000000000200000016C72E01B1
7156.3 MK/s - 554 BKeys - 2^39.01 [50.39%] - RUN: 00:01:17.7|END: 00:01:16.5 - Found: 33 Public Addr: 1PWo3Je3zaYTVTY7do4g1k2P3CZdP24p3L Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfetJoaNMqvfABY Priv (HEX): 0x0000000000000000000000000000000000000000000000020000001C3F360535
Public Addr: 1PWo3JeL6QYumwQZuHE89Hj2ymLxgv1KYN Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqxC2J88RADUkVE Priv (HEX): 0x000000000000000000000000000000000000000000000002000000D38D1E0588
7171.9 MK/s - 567 BKeys - 2^39.04 [51.56%] - RUN: 00:01:19.5|END: 00:01:14.7 - Found: 35 Public Addr: 1PWo3Je2muLW8JF2ZVHUKkYetpuoVLU6yD Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kghCJnFGFZNxWGK Priv (HEX): 0x0000000000000000000000000000000000000000000000020000002EC15A1116
Public Addr: 1PWo3JefKEBDixWNeymPmWtNBsBgDAeR2R Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kmyhKJnQB4ShdMP Priv (HEX): 0x0000000000000000000000000000000000000000000000020000008CD0D2102F
7155.6 MK/s - 584 BKeys - 2^39.09 [53.13%] - RUN: 00:01:21.9|END: 00:01:12.3 - Found: 37 Public Addr: 1PWo3JesheDWC3kipKnAQreArtjVnUQz4p Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqQj8yFkeUKpDUP Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C9E5422006
7150.0 MK/s - 597 BKeys - 2^39.12 [54.30%] - RUN: 00:01:23.7|END: 00:01:10.5 - Found: 38 Public Addr: 1PWo3JegduHkrk556eofwDvT68GbZ9J6kS Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kg5YsyLqLs3XPaE Priv (HEX): 0x00000000000000000000000000000000000000000000000200000023D0F62EAE
Public Addr: 1PWo3Jese8NnywVYLo4S7dDtAjt9XgVvSa Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kr4KZAsF1ssNr9A Priv (HEX): 0x000000000000000000000000000000000000000000000002000000D56EB22D6B
7125.5 MK/s - 606 BKeys - 2^39.14 [55.08%] - RUN: 00:01:24.9|END: 00:01:09.2 - Found: 40 Public Addr: 1PWo3JevBoWspcTsnvVYCx2Hq9Sej1rW8U Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4km8CSNLJsDZCMLJ Priv (HEX): 0x0000000000000000000000000000000000000000000000020000007DA0223450
7158.6 MK/s - 610 BKeys - 2^39.15 [55.47%] - RUN: 00:01:25.5|END: 00:01:08.6 - Found: 41 Public Addr: 1PWo3JeorcGmYVVVGtpb8HjT7b9t8BhsTg Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpLX3b1faDYi2da Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B6CDFE3A61
7140.9 MK/s - 614 BKeys - 2^39.16 [55.86%] - RUN: 00:01:26.1|END: 00:01:08.0 - Found: 42 Public Addr: 1PWo3JerAEen8VMQb5tmXBUU7rVCgrwd32 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjRj3PmwK1gHG8b Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005F67E23C04
7171.5 MK/s - 627 BKeys - 2^39.19 [57.03%] - RUN: 00:01:27.9|END: 00:01:06.2 - Found: 43 Public Addr: 1PWo3JeLDcwhRmbEkJPCyskyBui3EwvRER Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kkpBsixfvr5q6nC Priv (HEX): 0x00000000000000000000000000000000000000000000000200000078193E4829
Public Addr: 1PWo3JeYS9VYJ576fq1Ff2FyJ98cfB7dXj Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knB1GysuAqkbx3W Priv (HEX): 0x000000000000000000000000000000000000000000000002000000904956495D
7162.0 MK/s - 649 BKeys - 2^39.24 [58.98%] - RUN: 00:01:30.9|END: 00:01:03.2 - Found: 45 Public Addr: 1PWo3JemR25JDWry5vKSGLqquBq6xAVA98 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kf7J7LdSnfT8nTa Priv (HEX): 0x000000000000000000000000000000000000000000000002000000128D725C59
7156.1 MK/s - 657 BKeys - 2^39.26 [59.77%] - RUN: 00:01:32.1|END: 00:01:02.0 - Found: 46 Public Addr: 1PWo3Je2crkWDmyd9dDX7aiTfEBkAA2qdt Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjcoYGswJCemKVS Priv (HEX): 0x00000000000000000000000000000000000000000000000200000062CE2A66D7
Public Addr: 1PWo3JeVbnYoxBs9cjrDgVAQznyiqpPTFB Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kse13QRzeYP8NVE Priv (HEX): 0x000000000000000000000000000000000000000000000002000000F1916267EA
7114.4 MK/s - 666 BKeys - 2^39.28 [60.55%] - RUN: 00:01:33.3|END: 00:01:00.8 - Found: 48 Public Addr: 1PWo3JekDpiCiUvRG3KNT4X8j557M63cLA Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kijaFDeVM1NhVvd Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005315766C3C
7144.7 MK/s - 674 BKeys - 2^39.29 [61.33%] - RUN: 00:01:34.5|END: 00:00:59.6 - Found: 49 Public Addr: 1PWo3JeEiEjz13PeJZPev326NSh4gnKV2w Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4khzB3Pt8nA8EKDA Priv (HEX): 0x00000000000000000000000000000000000000000000000200000045C3D6778F
Public Addr: 1PWo3JeS3GLD5na3W3ycfMib47gxq3QptD Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjFKqNN2W7Hbe1c Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005C36D27621
7175.0 MK/s - 704 BKeys - 2^39.36 [64.06%] - RUN: 00:01:38.7|END: 00:00:55.4 - Found: 51 Public Addr: 1PWo3Jewsm26TR5agk5YVyGDGkpFaerVwP Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kj2aiZAj22ksV29 Priv (HEX): 0x000000000000000000000000000000000000000000000002000000584DAA91F5
Public Addr: 1PWo3Jedxd1Kgq4zMDpvVaeoje92G42FVK Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krihoaAHoXDTUn5 Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E1363693DF
7125.9 MK/s - 713 BKeys - 2^39.38 [64.84%] - RUN: 00:01:39.9|END: 00:00:54.2 - Found: 53 Public Addr: 1PWo3JefkKPeib2LsGg4ZGAxbdDvub4jDa Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kgSBU8qQVpfibQU Priv (HEX): 0x0000000000000000000000000000000000000000000000020000002A25C69BBC
7149.5 MK/s - 726 BKeys - 2^39.40 [66.02%] - RUN: 00:01:41.7|END: 00:00:52.3 - Found: 54 Public Addr: 1PWo3JeFkJEVzFX17PTLaNqr8LrTzZB6NS Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ksAHb4VqXXnVES5 Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E9100AA472
7130.6 MK/s - 747 BKeys - 2^39.44 [67.97%] - RUN: 00:01:44.7|END: 00:00:49.3 - Found: 55 Public Addr: 1PWo3JeYDRPnUzjaf7azEnEA2Gg6tzh7HV Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4koimrKFimgJB1gG Priv (HEX): 0x000000000000000000000000000000000000000000000002000000ABD5CAB855
Public Addr: 1PWo3Je2WbBGoCo3VtWtKfApGwUYLVSoSh Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqJCSmR3JeEU3JA Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C7E44EBA7B
7192.0 MK/s - 786 BKeys - 2^39.52 [71.48%] - RUN: 00:01:50.1|END: 00:00:43.9 - Found: 57 Public Addr: 1PWo3JeJS9ZEYArbbW9XzCvstJdyfV6gug Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4km5UGSXNTrxTA6X Priv (HEX): 0x0000000000000000000000000000000000000000000000020000007CC9E2DFBC
7133.9 MK/s - 803 BKeys - 2^39.55 [73.05%] - RUN: 00:01:52.5|END: 00:00:41.5 - Found: 58 Public Addr: 1PWo3Je8pVETQTD8jTukwVCex4K711GiDW Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kekBQrxPTGUTwvT Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000C128EED6A
7143.0 MK/s - 807 BKeys - 2^39.55 [73.44%] - RUN: 00:01:53.1|END: 00:00:40.9 - Found: 59 Public Addr: 1PWo3JePFTQ9WxaXZWZu7ZNB3frktDjyAF Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kq45U8Ewi3vY1yD Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C38EFAF394
7163.0 MK/s - 846 BKeys - 2^39.62 [76.95%] - RUN: 00:01:58.5|END: 00:00:35.5 - Found: 60 Public Addr: 1PWo3JeMNcD4GY2gxYAxqz4DqpsoEeh77n Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfGe6s4Jw27BDhR Priv (HEX): 0x000000000000000000000000000000000000000000000002000000156B971536
7144.0 MK/s - 850 BKeys - 2^39.63 [77.34%] - RUN: 00:01:59.2|END: 00:00:34.9 - Found: 61 Public Addr: 1PWo3JeTQheUtU64LbNTHasBvuuD4YzvLj Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjDf89M9rbx5Fdd Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005BB3D31993
7145.0 MK/s - 863 BKeys - 2^39.65 [78.52%] - RUN: 00:02:01.0|END: 00:00:33.1 - Found: 62 Public Addr: 1PWo3Jewqu9jfFk7zRsnDKCShr3zeuU36R Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpUbhyvriQsbXSg Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B948CF2675
7156.6 MK/s - 880 BKeys - 2^39.68 [80.08%] - RUN: 00:02:03.4|END: 00:00:30.7 - Found: 63 Public Addr: 1PWo3JeH1TSwSMtW5Mk8JaUzZBtPEJsCPx Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kgQDvkyw7jrMYQt Priv (HEX): 0x000000000000000000000000000000000000000000000002000000298BFB368A
Public Addr: 1PWo3JeP7PHTpzcUiRvyECjszLfeutAdVN Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpSH5VHqCv4Bj8U Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B89273375B
7026.9 MK/s - 906 BKeys - 2^39.72 [82.42%] - RUN: 00:02:07.0|END: 00:00:27.0 - Found: 65 Public Addr: 1PWo3JeVHTeUQnzjec6cr34WP1sT86fsCC Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ks61xdp1BCENUSA Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E7C09F4F55
7151.5 MK/s - 919 BKeys - 2^39.74 [83.59%] - RUN: 00:02:08.8|END: 00:00:25.2 - Found: 66 Public Addr: 1PWo3JeGdk3H1coTdB4E1HAAigMWkMM57k Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kp4aFDPoBYfQdJ5 Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B1E95359A9
7146.6 MK/s - 923 BKeys - 2^39.75 [83.98%] - RUN: 00:02:09.4|END: 00:00:24.6 - Found: 67 Public Addr: 1PWo3Je2w5aecwYbZdsGQ7ze2fErLULPQf Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kejsvena7afPLAV Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000BFADF5CF4
7155.7 MK/s - 949 BKeys - 2^39.79 [86.33%] - RUN: 00:02:13.0|END: 00:00:21.0 - Found: 68 Public Addr: 1PWo3JearhKNBnvyKhLZ4zkHp8BUsAJAZ8 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kiuGmi277VzcFV5 Priv (HEX): 0x000000000000000000000000000000000000000000000002000000560F6B74ED
7137.5 MK/s - 953 BKeys - 2^39.79 [86.72%] - RUN: 00:02:13.6|END: 00:00:20.4 - Found: 69 Public Addr: 1PWo3JeKEkqv7SXzpFYzgFuQtBUfMVMV7Q Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ker1vxBJtPfkRXa Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000DDD177B6D
7123.8 MK/s - 958 BKeys - 2^39.80 [87.11%] - RUN: 00:02:14.2|END: 00:00:19.8 - Found: 70 Public Addr: 1PWo3JeHbgMvwVxbRzFbC5qwNeLM1KXK6F Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kkBoLrHnFJVdmns Priv (HEX): 0x0000000000000000000000000000000000000000000000020000006CEE777C5D
Public Addr: 1PWo3JeXPnaDXJVM7BJFFdGsZinKVPjzAj Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4koavkLhSj3D5kVr Priv (HEX): 0x000000000000000000000000000000000000000000000002000000A96D577EF4
7158.0 MK/s - 979 BKeys - 2^39.83 [89.06%] - RUN: 00:02:17.2|END: 00:00:16.8 - Found: 72 Public Addr: 1PWo3JeSm93uvPTBMe4DMsdRo1c2v8oV91 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kiquNf1X2949uGi Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005506BF9104
7128.8 MK/s - 988 BKeys - 2^39.85 [89.84%] - RUN: 00:02:18.4|END: 00:00:15.6 - Found: 73 Public Addr: 1PWo3JeX4DMwSXRVUAe933zF2D33xJxLjq Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqvnGzMBfUQAfu7 Priv (HEX): 0x000000000000000000000000000000000000000000000002000000D31E639A34
7167.8 MK/s - 1014 BKeys - 2^39.88 [92.19%] - RUN: 00:02:22.0|END: 00:00:12.0 - Found: 74 Public Addr: 1PWo3JeKjSQTYZdh5joG42hKyz4eneG9U3 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqfc91iR8pQfNXm Priv (HEX): 0x000000000000000000000000000000000000000000000002000000CE7637B12A
7151.0 MK/s - 1031 BKeys - 2^39.91 [93.75%] - RUN: 00:02:24.4|END: 00:00:09.6 - Found: 75 Public Addr: 1PWo3Jedwac7qvLEy3jYmWzeqSjit72TMZ Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ki784H45AhDFXu9 Priv (HEX): 0x00000000000000000000000000000000000000000000000200000047E5BBC1D5
Public Addr: 1PWo3Je5pkEwDZbkLnY4ssg7sBccQVtQ4g Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knpGLkSB76Uevw8 Priv (HEX): 0x0000000000000000000000000000000000000000000000020000009BB88FC1A9
Public Addr: 1PWo3JekQFTr9qgXjsyPjVneTpX2Qc2mB9 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kt7Xjnk1WoYfD6n Priv (HEX): 0x000000000000000000000000000000000000000000000002000000FA0427C321
7160.8 MK/s - 1035 BKeys - 2^39.91 [94.14%] - RUN: 00:02:25.0|END: 00:00:09.0 - Found: 78 Public Addr: 1PWo3JefV9tbr6TkNmDfXsqZYYgtnrGbL6 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ks6eGDcGev4DZDQ Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E7F1CBC437
7105.6 MK/s - 1039 BKeys - 2^39.92 [94.53%] - RUN: 00:02:25.6|END: 00:00:08.4 - Found: 79 Public Addr: 1PWo3JeUTADQ16CevGQ5DELCvSJGXt5r6S Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjJbDR3z57QKU3g Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005D3757C8B0
7155.5 MK/s - 1057 BKeys - 2^39.94 [96.09%] - RUN: 00:02:28.0|END: 00:00:06.0 - Found: 80 Public Addr: 1PWo3Je5aYoc1d4H3JKpoHB46LdVNQpPvE Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqbaSicakQU8kgA Priv (HEX): 0x000000000000000000000000000000000000000000000002000000CD39ABDBA1
7159.1 MK/s - 1061 BKeys - 2^39.95 [96.49%] - RUN: 00:02:28.6|END: 00:00:05.4 - Found: 81 Public Addr: 1PWo3JeGG9ZD9yHpsoUEtCP8WZCKMf7xC8 Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ksubNeAUuwfhkhX Priv (HEX): 0x000000000000000000000000000000000000000000000002000000F65A53DC8D
7140.4 MK/s - 1074 BKeys - 2^39.97 [97.66%] - RUN: 00:02:30.4|END: 00:00:03.6 - Found: 82 Public Addr: 1PWo3JeaUpFZNbcHyHD2MQK9jFCvN4iHTa Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krYNpc6czAr4kVN Priv (HEX): 0x000000000000000000000000000000000000000000000002000000DE0ADFE8BD
7165.7 MK/s - 1087 BKeys - 2^39.98 [98.83%] - RUN: 00:02:32.2|END: 00:00:01.8 - Found: 83 Public Addr: 1PWo3JeLXdHd8q1Sjo169aUXoLkAd39RDq Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqFHyUDHYxrMKEa Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C7001BF68A
7149.9 MK/s - 1091 BKeys - 2^39.99 [99.22%] - RUN: 00:02:32.8|END: 00:00:01.2 - Found: 84 Public Addr: 1PWo3JexCfDsYENDp8iw71BMz8nWXUubed Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kf8wsQe2L5uPs4L Priv (HEX): 0x000000000000000000000000000000000000000000000002000000130F27F874
7117.6 MK/s - 1095 BKeys - 2^39.99 [99.61%] - RUN: 00:02:33.4|END: 00:00:00.6 - Found: 85 Public Addr: 1PWo3Je7mwXX8JNttLhb3pucZxcArmjVnh Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kiV1CkBohwVSULZ Priv (HEX): 0x0000000000000000000000000000000000000000000000020000004E9CD3FD62
7124.9 MK/s - 1100 BKeys - 2^40.00 [100.00%] - RUN: 00:02:34.0|END: 00:00:00.0 - Found: 86 Range Finished! - Average Speed: 7135.4 [MK/s] - Found: 86 Current task END time: Fri Dec 5 10:19:04 2025
Honestly, I wasn’t able to reproduce the issue you found. The only difference, aside from the speed, is that the “old version” finds one extra prefix: Public Addr: 1PWo3Je9Jc7wiMvUoH571GXZdgd1Ew4M7c Priv (HEX): 0x00000000000000000000000000000000000000000000000200000111A8C5B6DF But this key is outside the range, because older VS versions made the GPU perform unnecessary work when the size of the range wasn’t a multiple of the number of threads.
|
|
|
|
|
|
kTimesG
|
 |
December 05, 2025, 10:04:21 AM |
|
You truly don’t understand what you’re saying if you claim that the Kangaroo algorithm does not use the Birthday Paradox.
The Kangaroo algorithm does not use the birthday paradox.It is in the literature, it is in the academic papers, it is written in black over white, with subject and predicate, that the Kangaroo algorithm does not use the birthday paradox. It's not a stupid claim generated by a non-sense AI. It is a hard fact accompanied by multiple evidence. Period. So, wherever you see that Kangaroo uses the birthday paradox, or that it is based on the birthday paradox, or that it works due to the birthday paradox, that is an error. But - you will only find such statements from people who are not aware that Kangaroo does not use the birthday paradox, and there are zero scientific papers that make such a wrong statement, because real science gets peer reviewed, and such a gross error would never make it to the community. In contrast, 607 pages of viral trash can contain whatever shit people dream at night.
|
Off the grid, training pigeons to broadcast signed messages.
|
|
|
bibilgin
Newbie
Offline
Activity: 275
Merit: 0
|
 |
December 05, 2025, 10:36:50 AM |
|
You truly don’t understand what you’re saying if you claim that the Kangaroo algorithm does not use the Birthday Paradox.
The Kangaroo algorithm does not use the birthday paradox.It is in the literature, it is in the academic papers, it is written in black over white, with subject and predicate, that the Kangaroo algorithm does not use the birthday paradox. It's not a stupid claim generated by a non-sense AI. It is a hard fact accompanied by multiple evidence. Period. So, wherever you see that Kangaroo uses the birthday paradox, or that it is based on the birthday paradox, or that it works due to the birthday paradox, that is an error. But - you will only find such statements from people who are not aware that Kangaroo does not use the birthday paradox, and there are zero scientific papers that make such a wrong statement, because real science gets peer reviewed, and such a gross error would never make it to the community. In contrast, 607 pages of viral trash can contain whatever shit people dream at night. https://faculty.uml.edu/rmontenegro/research/kangaroo.pdfhttps://arxiv.org/pdf/0812.0789We would like you to review the article here and tell us what you understand.
|
|
|
|
|
brainless
Member

Online
Activity: 451
Merit: 35
|
 |
December 05, 2025, 12:02:13 PM |
|
Again in short What program he wish to use, doesn't matter Only his plan to use 100s gpu to gather dp for his database for finding 135 in given 200$ , greedy dreams to greedy people
|
13sXkWqtivcMtNGQpskD78iqsgVy9hcHLF
|
|
|
Torin Keepler
Newbie
Offline
Activity: 22
Merit: 0
|
 |
December 05, 2025, 12:08:25 PM Last edit: December 05, 2025, 06:58:53 PM by hilariousandco |
|
You truly don’t understand what you’re saying if you claim that the Kangaroo algorithm does not use the Birthday Paradox.
The Kangaroo algorithm does not use the birthday paradox.It is in the literature, it is in the academic papers, it is written in black over white, with subject and predicate, that the Kangaroo algorithm does not use the birthday paradox. It's not a stupid claim generated by a non-sense AI. It is a hard fact accompanied by multiple evidence. Period. So, wherever you see that Kangaroo uses the birthday paradox, or that it is based on the birthday paradox, or that it works due to the birthday paradox, that is an error. But - you will only find such statements from people who are not aware that Kangaroo does not use the birthday paradox, and there are zero scientific papers that make such a wrong statement, because real science gets peer reviewed, and such a gross error would never make it to the community. In contrast, 607 pages of viral trash can contain whatever shit people dream at night. The birthday paradox states that a collision (a match) occurs much earlier than intuition suggests: for two people to share one birthday out of 365 possible dates, only 23 people are enough for the probability of a match to be about 50%. In Pollard's Kangaroo algorithm, the same idea appears as follows: 1. Two random walks (tame and wild) move through a large state space. 2. Even though the space is huge, a collision occurs after roughly the square root of the range. 3. This early encounter makes it possible to compute the unknown key. So the paradoxical and unexpected frequency of collisions from the birthday paradox is mathematically reflected in the fact that the kangaroo algorithm finds a collision and solves the problem in square-root time relative to the interval size, rather than linearly. 1. First you demanded the SHA-256 hash of the public key as proof of ownership of the public key. I provided it, but you still had no idea what to do with it. 2. Then you claimed that Pollard's Kangaroo algorithm is not used in the RCKangaroo program, yet you were unable to explain why its very name clearly refers to that algorithm. 3. Later you started insisting that RCKangaroo uses the Gaudry–Schost algorithm, but you still could not provide even a short code example showing where exactly this algorithm is used. 4. And now you fail to see the connection between the birthday paradox and the Kangaroo algorithm.At first I thought you were simply mistaken. But the fact that you fail to grasp such elementary concepts suggests something else entirely – you're not just unfamiliar with this topic; you seem to be far removed from mathematics as a whole. Again in short What program he wish to use, doesn't matter Only his plan to use 100s gpu to gather dp for his database for finding 135 in given 200$ , greedy dreams to greedy people
If you can answer for yourself how a challenge in the 110–115-bit range could possibly help solve Puzzle-135, you will understand that there is no direct connection at all. And yes, the challenge will take place, and the prize will soon find its winners. Before seeing some kind of conspiracy, first answer a simple question: what is the relationship between a 115-bit challenge and using this approach to search for 135 bits, given that 115 bits can be solved within about eight days on normal hardware, and there is no reason whatsoever to involve a large number of people for that. https://t.me/puzzle135/14976The purpose of this challenge is to demonstrate the effectiveness of the program and the approach, with a reward of 200 dollars. Yes, I do hope that after seeing how the program works, some people might want to try searching for the 135 puzzle as well. Moreover, the profit-sharing model in case the 135 puzzle is found is very fair. But the 200-dollar challenge itself is not directly connected to participating in solving Puzzle 135. And anyone who finds the 200 dollars has no obligation whatsoever to search for Puzzle 135.
|
|
|
|
|
|
kTimesG
|
 |
December 05, 2025, 12:37:37 PM Last edit: December 05, 2025, 12:51:41 PM by kTimesG |
|
Who's "we"? If you actually read those, there is absolutely no sentence in either of those that says Kangaroo uses the Birthday Paradox. I'm gonna post again the PDF on which RetiredCoder has based his RCKang proof of concept:https://scispace.com/pdf/using-equivalence-classes-to-accelerate-solving-the-discrete-uzjbi3yc92.pdfand here is some quote on the subject (it is literally spread all over the paper why it's based on Gaudry-Schost, and why it is different than Kangaroo). Jesus .... The kangaroo method is not analysed using the birthday paradox but using the mean step size m of the pseudorandom walks. Once the rear kangaroo reaches the starting point of the front kangaroo it is jumping over a region where roughly one in m group elements have been visited by the front kangaroo. Hence, there is a roughly 1/m probability at each step that the back kangaroo lands on a footprint of the front kangaroo. Therefore, the walks collide after an expected m steps
And here is the very same quote from https://eprint.iacr.org/2010/617.pdfby John M. Pollard himself. Exact quote below The kangaroo method is not analysed using the birthday paradox but using the mean step size m of the pseudorandom walks. Once the rear kangaroo reaches the starting point of the front kangaroo it is jumping over a region where roughly one in m group elements have been visited by the front kangaroo. Heuristically, there is therefore a 1/m probability at each step that the back kangaroo lands on a footprint of the front kangaroo. Hence, the walks join after an expected m steps.
Gaudry and Schost [6] developed a different approach to algorithms for solving the DLP. Their method involves pseudorandom walks of different types (typically, “tame” walks and “wild” walks) in subsets of the group. One applies a version of the birthday paradox in the regions of overlap of the subsets. A collision between walks of two different types leads to a solution to the DLP. Galbraith and Ruprai [3, 4] have shown that the Gaudry-Schost method can have some advantages over the Pollard kangaroo method. In particular, it can be used to efficiently solve the DLP in an interval when using equivalence classes under inversion
Stop treating AI output as real science.
|
Off the grid, training pigeons to broadcast signed messages.
|
|
|
|
fixedpaul
|
 |
December 05, 2025, 01:14:06 PM |
|
1. First you demanded the SHA-256 hash of the public key as proof of ownership of the public key. I provided it, but you still had no idea what to do with it.
The sha256 of the public key is used to prove that you at least know it, that you probably also have the private key, and that you didn’t just take some random address with $200 and no outputs from the blockchain. The hash you provided points to the address 1KJGAauQRAkRtuuLxLQTvjz3vHvTiKqaom, which is not the one you claimed, so nobody can make any use of it. Maybe you're trolling, or maybe you just messed up a copy&paste, it happens. Maybe you really did compute the sha256(public key), but you need to hash the binary, not some textual encoding. I’m not sure which scenario is worse.
|
|
|
|
|
Torin Keepler
Newbie
Offline
Activity: 22
Merit: 0
|
 |
December 05, 2025, 01:23:20 PM Last edit: December 05, 2025, 06:58:12 PM by hilariousandco |
|
Here are the links to the sources that directly analyze the birthday paradox in Markov chains. 1. https://www.researchgate.net/publication/1901441_A_Birthday_Paradox_for_Markov_Chains_with_an_Optimal_Bound_for_Collision_in_the_Pollard_Rho_Algorithm_for_Discrete_LogarithmHere is the actual title of the work. "A Birthday Paradox for Markov chains, withan optimal bound for collision inthe Pollard Rho Algorithm for Discrete Logarithm" 2. https://faculty.uml.edu/rmontenegro/research/kangaroo.pdf?utm_sourceHere is a quotation from this work. "A Birthday Attack is a common approach towards solving these problems, and although heuristics can be given for the time complexity of these methods, rigorous results are rare. In [3] we examined one such method, namely Pollard’s Rho Algorithm to find the discrete logarithm on a cyclic group G, and verified the correctness of commonly held intuition" Furthermore, I ask you to follow the chronology and answer the questions in order rather than jumping from one to another. Therefore, first explain in your own words and without references why the RCKangaro program is called that, although, according to your statement, it does not use Pollard’s kangaroo algorithm. After that, please send me a code fragment in which, according to your statement, the Gaudry–Schost algorithm is used in the RCKangaro program. 1. First you demanded the SHA-256 hash of the public key as proof of ownership of the public key. I provided it, but you still had no idea what to do with it.
The sha256 of the public key is used to prove that you at least know it, that you probably also have the private key, and that you didn’t just take some random address with $200 and no outputs from the blockchain. The hash you provided points to the address 1KJGAauQRAkRtuuLxLQTvjz3vHvTiKqaom, which is not the one you claimed, so nobody can make any use of it. Maybe you're trolling, or maybe you just messed up a copy&paste, it happens. Maybe you really did compute the sha256(public key), but you need to hash the binary, not some textual encoding. I’m not sure which scenario is worse. Proof of ownership of the public key does not play a major role at the moment, because until I provide it to you, the challenge cannot begin, since the search for the private key will be based on the public key. Moreover, I will be able to sign a test message with this private key, or, for example, make a transaction from this address in the amount of 7777 satoshis.
|
|
|
|
|
zion3301
Newbie
Offline
Activity: 9
Merit: 0
|
 |
December 05, 2025, 01:38:14 PM |
|
utm_source=chatgpt.com? 😄
|
|
|
|
|
vneos
Jr. Member
Offline
Activity: 40
Merit: 12
|
 |
December 05, 2025, 01:46:19 PM Last edit: December 05, 2025, 06:57:43 PM by hilariousandco |
|
every participant can run KeyAuditor locally and check for collisions
if a private key is discovered, everyone will know, because verification is open to all
Could you explain why the verification process of KeyAuditor running locally is open to all? utm_source=chatgpt.com? 😄 AI is a tool. There is no problem with it if it is used correctly and the references it provides are double-checked. That is completely normal. every participant can run KeyAuditor locally and check for collisions
if a private key is discovered, everyone will know, because verification is open to all
Could you explain why the verification process of KeyAuditor running locally is open to all? The idea is that when using the modified RCKangaro program locally, all the work performed is saved into a file. Later, such files from different participants can be combined, checked for collisions between them, and used to compute the private key - something that cannot be done on a single local machine. In this way, the efficiency of the search increases. The KeyAuditor program analyzes a database of such files, searches for collisions, and, if one is found, outputs the private key. The program is not network-based and runs locally, so each participant can perform the analysis independently.
|
|
|
|
|
|
kTimesG
|
 |
December 05, 2025, 02:03:31 PM |
|
Here are the links to the sources that directly analyze the birthday paradox in Markov chains. 1. https://www.researchgate.net/publication/1901441_A_Birthday_Paradox_for_Markov_Chains_with_an_Optimal_Bound_for_Collision_in_the_Pollard_Rho_Algorithm_for_Discrete_LogarithmHere is the actual title of the work. "A Birthday Paradox for Markov chains, withan optimal bound for collision inthe Pollard Rho Algorithm for Discrete Logarithm" 2. https://faculty.uml.edu/rmontenegro/research/kangaroo.pdf?utm_sourceHere is a quotation from this work. "A Birthday Attack is a common approach towards solving these problems, and although heuristics can be given for the time complexity of these methods, rigorous results are rare. In [3] we examined one such method, namely Pollard’s Rho Algorithm to find the discrete logarithm on a cyclic group G, and verified the correctness of commonly held intuition" Additionally, I ask you to explain, in your own words and without references: Why is the RCKangaro program called that, although, according to your statement, it does not use Pollard’s kangaroo algorithm? Please send me a code fragment in which, according to your statement, the Gaudry–Schost algorithm is used in the RCKangaro program. You are continuing to confuse Pollard's Rho with Pollard's Kangaroo. They are different things. So your AI-based research is not even on the subject at all. If the direct statements from Pollard are not enough, nothing will be. Also, your question should be addressed to the owner of the program you mentioned. GitHub repos are not scientific / academic research.
|
Off the grid, training pigeons to broadcast signed messages.
|
|
|
Torin Keepler
Newbie
Offline
Activity: 22
Merit: 0
|
 |
December 05, 2025, 02:34:10 PM |
|
Here are the links to the sources that directly analyze the birthday paradox in Markov chains. 1. https://www.researchgate.net/publication/1901441_A_Birthday_Paradox_for_Markov_Chains_with_an_Optimal_Bound_for_Collision_in_the_Pollard_Rho_Algorithm_for_Discrete_LogarithmHere is the actual title of the work. "A Birthday Paradox for Markov chains, withan optimal bound for collision inthe Pollard Rho Algorithm for Discrete Logarithm" 2. https://faculty.uml.edu/rmontenegro/research/kangaroo.pdf?utm_sourceHere is a quotation from this work. "A Birthday Attack is a common approach towards solving these problems, and although heuristics can be given for the time complexity of these methods, rigorous results are rare. In [3] we examined one such method, namely Pollard’s Rho Algorithm to find the discrete logarithm on a cyclic group G, and verified the correctness of commonly held intuition" Additionally, I ask you to explain, in your own words and without references: Why is the RCKangaro program called that, although, according to your statement, it does not use Pollard’s kangaroo algorithm? Please send me a code fragment in which, according to your statement, the Gaudry–Schost algorithm is used in the RCKangaro program. You are continuing to confuse Pollard's Rho with Pollard's Kangaroo. They are different things. So your AI-based research is not even on the subject at all. If the direct statements from Pollard are not enough, nothing will be. Also, your question should be addressed to the owner of the program you mentioned. GitHub repos are not scientific / academic research. Here is a link to a more recent work from 2010, where the very first paragraph asserts the connection between the birthday paradox and the kangaroo algorithm. https://faculty.uml.edu/rmontenegro/research/kangaroo-journal.pdf?utm_sourceThe citation itself is from the first paragraph of this work. "This leads to the first sharp analysis of a non-trivial Birthday attack, proving that Pollard’s Kangaroo method solves the discrete logarithm problem" Please send me a code fragment in which, according to your statement, the Gaudry–Schost algorithm is used in the RCKangaroo program.
|
|
|
|
|
|
kTimesG
|
 |
December 05, 2025, 02:49:24 PM Last edit: December 05, 2025, 03:00:13 PM by kTimesG |
|
Here is a link to a more recent work from 2010, where the very first paragraph asserts the connection between the birthday paradox and the kangaroo algorithm. https://faculty.uml.edu/rmontenegro/research/kangaroo-journal.pdf?utm_sourceThe citation itself is from the first paragraph of this work. "This leads to the first sharp analysis of a non-trivial Birthday attack, proving that Pollard’s Kangaroo method solves the discrete logarithm problem" Please send me a code fragment in which, according to your statement, the Gaudry–Schost algorithm is used in the RCKangaro program. Dude, are you for real? I'm going on a broken record here. Kangaroo does not work based on the Birthday Paradox. Pollard says it himself. The analysis is not based on it. The complexity does not relate to it. The statement above does not say what you are trying to imply (there are two separate propositions there, buddy). What code fragment do you god damn want? RCKang creates a very big table of points, with arbitrary random distances, and makes side-ways jumps left and right. The starting distances are chosen at random. Do you want me to post the code? It's the entire code branch itself, not enough room to copy paste it here. These are all the ticking boxes that classifies it as a non-Kangaroo algorithm (even a single one would have sufficed, we have FOUR!). What the fuck do you actually want to prove here anyway? That AI is right, even though all the facts are against this? Here's, just for fun, a ChatGPT prompt, with zero memory, started from scratch, and simply started with the simple question: Does Kangaroo use the Birthday Paradox, or not?Here's the answer (anyone can test for themselves) Short answer:
NO, the Kangaroo algorithm (Pollard’s λ) does not use the birthday paradox.
Why not?
The birthday paradox is about the probability of random collisions between independently chosen elements. This idea is fundamental to Pollard’s ρ algorithm, where you look for two different states of a pseudo-random function that collide, creating a cycle.
Pollard’s Kangaroo (λ) works differently:
It does not search for random collisions.
It does not rely on two independently random walks that meet by chance.
Instead, it uses two guided walks (the “tame” kangaroo and the “wild” kangaroo) whose paths are structured so that they will eventually meet deterministically if the discrete log lies in a known interval.
Any “collision” between their paths is not due to the birthday paradox; it is caused by how the algorithm is designed.
What does the Kangaroo algorithm use?
- A set of pseudo-random jump sizes.
- A technique like distinguished points for detecting when paths cross.
- A running time around 𝑂(𝑁1/2), but this is not because of the birthday paradox — it comes from the expected number of steps for two directed walks to close the distance between them in an interval of size 𝑁.
|
Off the grid, training pigeons to broadcast signed messages.
|
|
|
Torin Keepler
Newbie
Offline
Activity: 22
Merit: 0
|
 |
December 05, 2025, 03:10:01 PM |
|
Yeah, man, you’re really being thick-headed. You’re not even trying anymore - you just copy whatever you feed into ChatGPT without bothering to double-check it. I sent you at least three scientific papers that claim the opposite. Read the article again and stop copy-pasting whatever the AI generates for you. https://faculty.uml.edu/rmontenegro/research/kangaroo-journal.pdf?utm_sourcePollard’s kangaroo method computes a discrete logarithm over a bounded interval by running two independent pseudorandom walks in a group. The solution arises when the walks first meet, yielding an expected running time of order √L, governed by the time to this collision. This behavior is directly linked to the birthday paradox: as in the classical setting, the probability of a collision between two stochastic processes becomes significant after roughly the square root of the state-space size. Hence the kangaroo method is viewed as a specialized form of a birthday-type attack, adapted to group structure and the discrete logarithm problem. Why don’t you want to admit that you were wrong? There’s nothing shameful about it. Go take a shower, eat a sandwich, and think it over once again.
|
|
|
|
|
|