Bitcoin Forum
December 25, 2025, 05:01:00 PM *
News: Latest Bitcoin Core release: 30.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 [608] 609 610 611 612 613 614 615 616 617 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 358723 times)
Torin Keepler
Newbie
*
Offline Offline

Activity: 22
Merit: 0


View Profile
December 05, 2025, 12:20:37 AM
 #12141

You’ve probably overdosed on ChatGPT. Again, you’ve mixed everything together with no specifics, just the same blah-blah-blah. I explicitly asked you to include in your reply a fragment of the program’s code where, in your opinion, the Gaudry–Schost algorithm is actually used. And for now you’re just flapping around like a horseradish root in a box, and nothing more.

Are you blind, or stupid?

Jump table: 1024 points or whatever = CHECKED. Kangaroo for #135 would need only 85 points.
Arbitrary jump distances? CHECKED. Kangaroo uses exact distances of powers of two.
Side-ways jumps? CHECKED. Kangaroos only jump in one direction, to avoid cycles.
Random start distances? CHECKED. Kangaroo uses mid-point starts to minimize expected tame-wild distances.

Now, did you actually bother to search and read Pollard's PDF I mentioned? It EXPLICTLY explains the difference between what a Kangaroo algorithm is, and what the Gaudry-Schost philosophy is.

Even RetiredCoder explicitly mentioned that his algo is a tweak on the Galbraith paper about EC DLP using a negation map (which in itself is an implementation of Gaudry-Schost).

Good luck with your "challenge" or whatever. You're covered by so many red flags at this point that I doubt anyone can take you for real anyway (what's the deal with not even providing the correct SHA256 of that address, since it doesn't expose the pubKey anyway? What are you actually hiding?).

You’re trying to derail the discussion by shifting the focus to the public key, even though I already stated very clearly: before the challenge starts, I will inevitably have to reveal it anyway, so that question resolves itself automatically. Moreover, you specifically asked for the SHA-256 hash of that public key - I provided it, and you still have no idea what to do with it. Why did you request it in the first place?

But the main point is this: stop evading the topic and provide the exact code fragment where, in your opinion, the Gaudry–Schost algorithm is used in the RCKangaroo program.
kTimesG
Full Member
***
Offline Offline

Activity: 700
Merit: 220


View Profile
December 05, 2025, 12:28:07 AM
 #12142

You’re trying to derail the discussion by shifting the focus to the public key, even though I already stated very clearly: before the challenge starts, I will inevitably have to reveal it anyway, so that question resolves itself automatically. Moreover, you specifically asked for the SHA-256 hash of that public key - I provided it, and you still have no idea what to do with it. Why did you request it in the first place?

But the main point is this: stop evading the topic and provide the exact code fragment where, in your opinion, the Gaudry–Schost algorithm is used in the RCKangaroo program.

Your SHA256 is not checking out to the address you sent funds to. I don't care about the public key at all, did you miss that part? The question was: do YOU possess the PRIVATE KEY? So far, you failed to prove this, and it seems you refuse to do it (validly) even if it is so simple. Whatever, dude.

Also, I kinda tried in seven different ways to get some sense into you, but it's ok, you seem to ask for attention, so I'll stop feeding the troll now!

Off the grid, training pigeons to broadcast signed messages.
Torin Keepler
Newbie
*
Offline Offline

Activity: 22
Merit: 0


View Profile
December 05, 2025, 12:39:33 AM
Last edit: December 05, 2025, 05:07:12 PM by Torin Keepler
 #12143

You’re trying to derail the discussion by shifting the focus to the public key, even though I already stated very clearly: before the challenge starts, I will inevitably have to reveal it anyway, so that question resolves itself automatically. Moreover, you specifically asked for the SHA-256 hash of that public key - I provided it, and you still have no idea what to do with it. Why did you request it in the first place?

But the main point is this: stop evading the topic and provide the exact code fragment where, in your opinion, the Gaudry–Schost algorithm is used in the RCKangaroo program.

Your SHA256 is not checking out to the address you sent funds to. I don't care about the public key at all, did you miss that part? The question was: do YOU possess the PRIVATE KEY? So far, you failed to prove this, and it seems you refuse to do it (validly) even if it is so simple. Whatever, dude.

Also, I kinda tried in seven different ways to get some sense into you, but it's ok, you seem to ask for attention, so I'll stop feeding the troll now!

The birthday paradox is precisely what is used in Pollard’s kangaroo algorithm, since its runtime analysis is based on the probability of a collision between two pseudorandom walks in a group. (In the case of the RCKangaroo implementation, the collisions occur between three herds of kangaroos: one tame and two wild.)

You asked for the SHA-256 hash of the public key. I gave it to you. Why did you ask for it?

I’ve repeatedly asked you to provide the code block that, according to your claim, uses the Gaudry–Schost algorithm in the RCKangaroo program.
You’re just straining the air, and nothing more.
kTimesG
Full Member
***
Offline Offline

Activity: 700
Merit: 220


View Profile
December 05, 2025, 12:46:48 AM
 #12144

And yes, now you’re trying to back out. I’ve repeatedly asked you to provide the code block that, according to your claim, uses the Gaudry–Schost algorithm in the RCKangaroo program.

It's the entire program and algorithm, mister! Maybe you should hunt down Pollard and ask him whether he wrote those words in his paper (where he clearly makes the distinction) with AI or something...

I can't advise any one reading this to get involved with whatever "challenge" you're up to. Clearly you're way, way off basic stuff, on multiple subjects. Byez.

Off the grid, training pigeons to broadcast signed messages.
Torin Keepler
Newbie
*
Offline Offline

Activity: 22
Merit: 0


View Profile
December 05, 2025, 12:58:07 AM
 #12145

And yes, now you’re trying to back out. I’ve repeatedly asked you to provide the code block that, according to your claim, uses the Gaudry–Schost algorithm in the RCKangaroo program.

It's the entire program and algorithm, mister! Maybe you should hunt down Pollard and ask him whether he wrote those words in his paper (where he clearly makes the distinction) with AI or something...

I can't advise any one reading this to get involved with whatever "challenge" you're up to. Clearly you're way, way off basic stuff, on multiple subjects. Byez.

You truly don’t understand what you’re saying if you claim that the Kangaroo algorithm does not use the Birthday Paradox.
JackMazzoni
Jr. Member
*
Offline Offline

Activity: 165
Merit: 6


View Profile
December 05, 2025, 01:26:18 AM
 #12146

It would we great if someone could post the hardware requirements in each puzzle solve and unsolved based on 4090 gpu or based on ram.

Need Wallet Recovery? PM ME. 100% SAFE
fixedpaul
Member
**
Offline Offline

Activity: 83
Merit: 26


View Profile WWW
December 05, 2025, 09:53:31 AM
 #12147

Has anyone else attempted to quantify the actual keys per second on some of the popular puzzle solving scripts (ie fixedpaul)?

The fixedpaul vanitysearch reports a much higher keys per second than other scripts yet when I attempt to quantify those checks via expected prefix matches per m/keys checked it fails horribly, suggesting in reality it's running at 1% or less than the reported keys per second.

I'm reliably hitting one 1PWo3Je prefix hit approx every 5 billion keys checked on "slower" scripts.
Fixedpaul on the other hand is only hitting one 1PWo3J every 80 billion keys, and zero 1PWo3Je's.

I've tested these for weeks on multiple machines getting the same results: Fixedpaul is the fastest if you trust it's keys per second output; and if going by average prefix matches per m/keys checked the fixedpaul produces the least amount of prefix matches.

Prefix matches don't really matter but based on simple probability and averages it's a decent way to benchmark the actual keys checked.

  

Could you please share more information about the tests you ran? The repository has existed for a year now, and I think that if the speed were really as you said 1% of the reported output, someone would have noticed.

I tried running a quick test, comparing it with some “VanitySearch v1.16”, searching for the prefixes 1PWo3Je in the range 20000000000000000:2000000FFFFFFFFFF.
I’m copying both logs here:

Code:
VanitySearch v1.16 Linux with BitCrack integration
[keyspace] start=0000000000000000000000000000000000000000000000020000000000000000
[keyspace]   end=000000000000000000000000000000000000000000000002000000FFFFFFFFFF
Difficulty: 15318045009
Search: 1PWo3Je [Compressed]
Current task START time: Fri Dec  5 10:10:28 2025
Number of CPU thread: 0
GPU: GPU #0 NVIDIA GeForce RTX 4090 (128x128 cores) Grid(1024x256)
5285.78 MK/s (GPU 5285.78 MK/s) (2^33.32) [00:00:02 RUN || END 00:03:25][0]
Public Addr: 1PWo3JemR25JDWry5vKSGLqquBq6xAVA98
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kf7J7LdSnfT8nTa
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000128D725C59

Public Addr: 1PWo3Je2w5aecwYbZdsGQ7ze2fErLULPQf
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kejsvena7afPLAV
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000BFADF5CF4

Public Addr: 1PWo3JegNEK3ayZNTkA9rwfrapcyUPmttW
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfM4iQtA17wCgpR
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000016C72E01B1

Public Addr: 1PWo3JeHF4QfW8MuyEWdj7x5ybpd6DZURe
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfLAiKeAWjkjk28
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000001680BDFB01
5329.68 MK/s (GPU 5329.68 MK/s) (2^34.92) [00:00:06 RUN || END 00:03:20][4]
Public Addr: 1PWo3JeMNcD4GY2gxYAxqz4DqpsoEeh77n
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfGe6s4Jw27BDhR
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000156B971536

Public Addr: 1PWo3Jewkh71KfvWF5ky9TZwvC77mWNTB2
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4keduBCdNSRhyASz
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000A2530DA88
5358.18 MK/s (GPU 5358.18 MK/s) (2^35.67) [00:00:10 RUN || END 00:03:15][6]
Public Addr: 1PWo3Je8pVETQTD8jTukwVCex4K711GiDW
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kekBQrxPTGUTwvT
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000C128EED6A

Public Addr: 1PWo3JexCfDsYENDp8iw71BMz8nWXUubed
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kf8wsQe2L5uPs4L
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000130F27F874

Public Addr: 1PWo3JeKEkqv7SXzpFYzgFuQtBUfMVMV7Q
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ker1vxBJtPfkRXa
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000DDD177B6D
5374.58 MK/s (GPU 5374.58 MK/s) (2^36.15) [00:00:14 RUN || END 00:03:10][9]
Public Addr: 1PWo3JeNyJHprvMyG83MJ2w7rqtM4dQTr2
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kerT1aGPjn3ZJ1q
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000DFF10199D
5399.01 MK/s (GPU 5399.01 MK/s) (2^36.52) [00:00:18 RUN || END 00:03:05][10]
Public Addr: 1PWo3JegduHkrk556eofwDvT68GbZ9J6kS
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kg5YsyLqLs3XPaE
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000023D0F62EAE
5167.65 MK/s (GPU 5167.65 MK/s) (2^36.62) [00:00:20 RUN || END 00:03:12][11]
Public Addr: 1PWo3JeKBLqaCKwSXw3Va2ZjSVLv6ED3od
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kgRDyBFoZbZ5BRP
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000029DA99B6DC
5183.81 MK/s (GPU 5183.81 MK/s) (2^36.76) [00:00:22 RUN || END 00:03:09][12]
Public Addr: 1PWo3JefkKPeib2LsGg4ZGAxbdDvub4jDa
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kgSBU8qQVpfibQU
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000002A25C69BBC
5187.87 MK/s (GPU 5187.87 MK/s) (2^37.01) [00:00:26 RUN || END 00:03:05][13]
Public Addr: 1PWo3Je3zaYTVTY7do4g1k2P3CZdP24p3L
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfetJoaNMqvfABY
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000001C3F360535
5203.97 MK/s (GPU 5203.97 MK/s) (2^37.23) [00:00:30 RUN || END 00:03:00][14]
Public Addr: 1PWo3JeuZ5SjzYp8SYicx2Mu5hgKaqxKhk
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfp7C1QdXTcxDXd
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000001F13B9A373
5203.67 MK/s (GPU 5203.67 MK/s) (2^37.32) [00:00:32 RUN || END 00:02:58][15]
Public Addr: 1PWo3JeH1TSwSMtW5Mk8JaUzZBtPEJsCPx
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kgQDvkyw7jrMYQt
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000298BFB368A
5200.89 MK/s (GPU 5200.89 MK/s) (2^37.55) [00:00:38 RUN || END 00:02:52][16]
Public Addr: 1PWo3JeRfVg3RjFL9aM2Sb8EcBHxGuZXTq
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kgrmBuK6RKYbCy5
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000031B0F46166
5200.59 MK/s (GPU 5200.59 MK/s) (2^37.63) [00:00:40 RUN || END 00:02:50][17]
Public Addr: 1PWo3JeEiEjz13PeJZPev326NSh4gnKV2w
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4khzB3Pt8nA8EKDA
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000045C3D6778F
5183.74 MK/s (GPU 5183.74 MK/s) (2^37.90) [00:00:48 RUN || END 00:02:42][18]
Public Addr: 1PWo3JeZKq6oi7uokhshHWP8eUN8o5EE8k
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4khQ6iXsGvHBntQU
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000003B4ED93BDF
5414.90 MK/s (GPU 5414.90 MK/s) (2^38.07) [00:00:54 RUN || END 00:02:29][19]
Public Addr: 1PWo3Je2muLW8JF2ZVHUKkYetpuoVLU6yD
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kghCJnFGFZNxWGK
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000002EC15A1116
5415.35 MK/s (GPU 5415.35 MK/s) (2^38.13) [00:00:56 RUN || END 00:02:27][20]
Public Addr: 1PWo3JeTQheUtU64LbNTHasBvuuD4YzvLj
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjDf89M9rbx5Fdd
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005BB3D31993
5184.33 MK/s (GPU 5184.33 MK/s) (2^38.16) [00:00:58 RUN || END 00:02:32][21]
Public Addr: 1PWo3JeS3GLD5na3W3ycfMib47gxq3QptD
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjFKqNN2W7Hbe1c
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005C36D27621
5184.27 MK/s (GPU 5184.27 MK/s) (2^38.26) [00:01:03 RUN || END 00:02:28][22]
Public Addr: 1PWo3Jewsm26TR5agk5YVyGDGkpFaerVwP
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kj2aiZAj22ksV29
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000584DAA91F5
5184.27 MK/s (GPU 5184.27 MK/s) (2^38.36) [00:01:07 RUN || END 00:02:24][23]
Public Addr: 1PWo3Jedwac7qvLEy3jYmWzeqSjit72TMZ
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ki784H45AhDFXu9
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000047E5BBC1D5
5184.23 MK/s (GPU 5184.23 MK/s) (2^38.40) [00:01:09 RUN || END 00:02:22][24]
Public Addr: 1PWo3JearhKNBnvyKhLZ4zkHp8BUsAJAZ8
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kiuGmi277VzcFV5
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000560F6B74ED

Public Addr: 1PWo3JekDpiCiUvRG3KNT4X8j557M63cLA
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kijaFDeVM1NhVvd
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005315766C3C

Public Addr: 1PWo3Je7mwXX8JNttLhb3pucZxcArmjVnh
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kiV1CkBohwVSULZ
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000004E9CD3FD62
5200.33 MK/s (GPU 5200.33 MK/s) (2^38.44) [00:01:11 RUN || END 00:02:19][27]
Public Addr: 1PWo3JeUTADQ16CevGQ5DELCvSJGXt5r6S
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjJbDR3z57QKU3g
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005D3757C8B0
5431.37 MK/s (GPU 5431.37 MK/s) (2^38.53) [00:01:15 RUN || END 00:02:09][28]
Public Addr: 1PWo3JeSm93uvPTBMe4DMsdRo1c2v8oV91
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kiquNf1X2949uGi
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005506BF9104
5200.08 MK/s (GPU 5200.08 MK/s) (2^38.59) [00:01:19 RUN || END 00:02:11][29]
Public Addr: 1PWo3JeHbgMvwVxbRzFbC5qwNeLM1KXK6F
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kkBoLrHnFJVdmns
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000006CEE777C5D
5199.89 MK/s (GPU 5199.89 MK/s) (2^38.63) [00:01:21 RUN || END 00:02:09][30]
Public Addr: 1PWo3JepgC86tBLWV5cCdimg5p1TCLpQxi
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjRnHMXHBjXg4DL
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005F6C45FB15
5200.11 MK/s (GPU 5200.11 MK/s) (2^38.67) [00:01:23 RUN || END 00:02:07][31]
Public Addr: 1PWo3JerAEen8VMQb5tmXBUU7rVCgrwd32
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjRj3PmwK1gHG8b
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005F67E23C04
5200.13 MK/s (GPU 5200.13 MK/s) (2^38.70) [00:01:25 RUN || END 00:02:05][32]
Public Addr: 1PWo3Je2crkWDmyd9dDX7aiTfEBkAA2qdt
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjcoYGswJCemKVS
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000062CE2A66D7
5169.30 MK/s (GPU 5169.30 MK/s) (2^38.77) [00:01:29 RUN || END 00:02:01][33]
Public Addr: 1PWo3JeEwBnrj4XA4CNgbzrR6h5Dp3WGnz
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kkNcwW7LticvphP
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000704090C3ED

Public Addr: 1PWo3JeM3aMVBTmdfFFt7pkQxdPpVgyJcW
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kkWRH97C3zc2d3Y
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000072A5456555
5393.63 MK/s (GPU 5393.63 MK/s) (2^38.84) [00:01:33 RUN || END 00:01:52][35]
Public Addr: 1PWo3JeCNyne35RYP8JPTvWpjUx1haqggb
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjtGnx3jQKQFCZX
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000678D854556
5164.09 MK/s (GPU 5164.09 MK/s) (2^38.89) [00:01:37 RUN || END 00:01:54][36]
Public Addr: 1PWo3JeXwdo9buxC5HYnksVH6hoJGKqhDe
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kmWaagyysSwAkrf
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000847E81955B

Public Addr: 1PWo3JeGKzTn8x5VstZw77WctBjxFqfVnW
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4km16iRSRnywCubg
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000007B7271552C
5170.96 MK/s (GPU 5170.96 MK/s) (2^38.98) [00:01:43 RUN || END 00:01:47][38]
Public Addr: 1PWo3Jeh956tujCUiVydBMRLEmVzGFQYtL
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4km4Wqyicp7ivGXT
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000007C7ED0DC3C
5164.96 MK/s (GPU 5164.96 MK/s) (2^39.04) [00:01:47 RUN || END 00:01:43][39]
Public Addr: 1PWo3JevBoWspcTsnvVYCx2Hq9Sej1rW8U
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4km8CSNLJsDZCMLJ
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000007DA0223450
5154.73 MK/s (GPU 5154.73 MK/s) (2^39.06) [00:01:49 RUN || END 00:01:41][40]
Public Addr: 1PWo3JeLDcwhRmbEkJPCyskyBui3EwvRER
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kkpBsixfvr5q6nC
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000078193E4829
5220.71 MK/s (GPU 5220.71 MK/s) (2^39.09) [00:01:51 RUN || END 00:01:38][41]
Public Addr: 1PWo3JeJS9ZEYArbbW9XzCvstJdyfV6gug
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4km5UGSXNTrxTA6X
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000007CC9E2DFBC
5368.96 MK/s (GPU 5368.96 MK/s) (2^39.12) [00:01:53 RUN || END 00:01:33][42]
Public Addr: 1PWo3Je1NkW54CRFCBngUHwwZCFpKDDK2m
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knaU61oFsaVobvJ
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000977C982FAD
5156.67 MK/s (GPU 5156.67 MK/s) (2^39.13) [00:01:55 RUN || END 00:01:36][43]
Public Addr: 1PWo3JefKEBDixWNeymPmWtNBsBgDAeR2R
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kmyhKJnQB4ShdMP
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000008CD0D2102F

Public Addr: 1PWo3JevCHbRL4KoR71WR3RBkezFL5AmbD
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kn9dEpZ3yJ9aPXf
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000008FDCEC9EE4

Public Addr: 1PWo3JeYS9VYJ576fq1Ff2FyJ98cfB7dXj
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knB1GysuAqkbx3W
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000904956495D
5139.29 MK/s (GPU 5139.29 MK/s) (2^39.16) [00:01:57 RUN || END 00:01:34][46]
Public Addr: 1PWo3Je5pkEwDZbkLnY4ssg7sBccQVtQ4g
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knpGLkSB76Uevw8
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000009BB88FC1A9
5119.75 MK/s (GPU 5119.75 MK/s) (2^39.23) [00:02:03 RUN || END 00:01:28][47]
Public Addr: 1PWo3JeaySN7L9BJCPAyMqsLLoGmefPVNm
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knG96PiwvnULnUg
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000091DCBD43A4
5122.55 MK/s (GPU 5122.55 MK/s) (2^39.28) [00:02:07 RUN || END 00:01:24][48]
Public Addr: 1PWo3JewLk1m1L2PYeM5Y9Bk8pM8BcBd67
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ko8zt9LtPmS82ds
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000A178501A10

Public Addr: 1PWo3JeVFjnLzneKD7ruPPYS9af9CXT2NC
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knpDs3LBL6FZeoe
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000009BB5349414
5129.08 MK/s (GPU 5129.08 MK/s) (2^39.31) [00:02:09 RUN || END 00:01:21][50]
Public Addr: 1PWo3Je8CUY5byN647YyHeozqiXhuUMPWm
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knu2L4fUJWvwFAN
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000009D2E653C59
5059.74 MK/s (GPU 5059.74 MK/s) (2^39.36) [00:02:16 RUN || END 00:01:17][51]
Public Addr: 1PWo3JeXPnaDXJVM7BJFFdGsZinKVPjzAj
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4koavkLhSj3D5kVr
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000A96D577EF4
5048.26 MK/s (GPU 5048.26 MK/s) (2^39.41) [00:02:20 RUN || END 00:01:13][52]
Public Addr: 1PWo3JeGdk3H1coTdB4E1HAAigMWkMM57k
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kp4aFDPoBYfQdJ5
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B1E95359A9
5032.03 MK/s (GPU 5032.03 MK/s) (2^39.43) [00:02:22 RUN || END 00:01:11][53]
Public Addr: 1PWo3JeeR5aZdF3jTCSBXUeD7JjhubkJjT
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpK6rMvcvb9RFSB
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B65EA8D922

Public Addr: 1PWo3Jej7pQyXkdY36JcKGLJNKSPbta4QR
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpN1BJvhfwLVtw3
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B742A9B3CE
5003.69 MK/s (GPU 5003.69 MK/s) (2^39.45) [00:02:24 RUN || END 00:01:09][55]
Public Addr: 1PWo3Jed442wzBXPWBnAWJkxsM7e8AaGvh
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4koXyBh7u9Tayvpk
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000A884F47589
5016.12 MK/s (GPU 5016.12 MK/s) (2^39.47) [00:02:26 RUN || END 00:01:07][56]
Public Addr: 1PWo3JeYDRPnUzjaf7azEnEA2Gg6tzh7HV
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4koimrKFimgJB1gG
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000ABD5CAB855
5070.22 MK/s (GPU 5070.22 MK/s) (2^39.49) [00:02:28 RUN || END 00:01:04][57]
Public Addr: 1PWo3JeorcGmYVVVGtpb8HjT7b9t8BhsTg
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpLX3b1faDYi2da
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B6CDFE3A61
5104.07 MK/s (GPU 5104.07 MK/s) (2^39.51) [00:02:30 RUN || END 00:01:02][58]
Public Addr: 1PWo3JeP7PHTpzcUiRvyECjszLfeutAdVN
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpSH5VHqCv4Bj8U
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B89273375B
5343.35 MK/s (GPU 5343.35 MK/s) (2^39.53) [00:02:32 RUN || END 00:00:57][59]
Public Addr: 1PWo3Jewqu9jfFk7zRsnDKCShr3zeuU36R
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpUbhyvriQsbXSg
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B948CF2675
5128.47 MK/s (GPU 5128.47 MK/s) (2^39.54) [00:02:34 RUN || END 00:00:58][60]
Public Addr: 1PWo3JePFTQ9WxaXZWZu7ZNB3frktDjyAF
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kq45U8Ewi3vY1yD
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C38EFAF394
5109.17 MK/s (GPU 5109.17 MK/s) (2^39.56) [00:02:36 RUN || END 00:00:56][61]
Public Addr: 1PWo3Je2WbBGoCo3VtWtKfApGwUYLVSoSh
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqJCSmR3JeEU3JA
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C7E44EBA7B
5135.31 MK/s (GPU 5135.31 MK/s) (2^39.60) [00:02:40 RUN || END 00:00:51][62]
Public Addr: 1PWo3JedQxvrgmQ7rDUxQL3P9KuhzArauv
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpyPfYRAprTabVJ
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C21ED0AAB6
5148.55 MK/s (GPU 5148.55 MK/s) (2^39.62) [00:02:42 RUN || END 00:00:49][63]
Public Addr: 1PWo3JesheDWC3kipKnAQreArtjVnUQz4p
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqQj8yFkeUKpDUP
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C9E5422006
5138.57 MK/s (GPU 5138.57 MK/s) (2^39.64) [00:02:44 RUN || END 00:00:47][64]
Public Addr: 1PWo3JeLXdHd8q1Sjo169aUXoLkAd39RDq
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqFHyUDHYxrMKEa
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C7001BF68A

Public Addr: 1PWo3JeGvmbp1FTF4FExWA41tjXNRoiUea
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqGrdjeYjWp57Wk
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C77AE9150B
5143.62 MK/s (GPU 5143.62 MK/s) (2^39.66) [00:02:46 RUN || END 00:00:45][66]
Public Addr: 1PWo3Je5aYoc1d4H3JKpoHB46LdVNQpPvE
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqbaSicakQU8kgA
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000CD39ABDBA1
5360.41 MK/s (GPU 5360.41 MK/s) (2^39.69) [00:02:50 RUN || END 00:00:39][67]
Public Addr: 1PWo3JeKjSQTYZdh5joG42hKyz4eneG9U3
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqfc91iR8pQfNXm
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000CE7637B12A
5373.64 MK/s (GPU 5373.64 MK/s) (2^39.71) [00:02:52 RUN || END 00:00:37][68]
Public Addr: 1PWo3JeX4DMwSXRVUAe933zF2D33xJxLjq
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqvnGzMBfUQAfu7
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000D31E639A34

Public Addr: 1PWo3JeFkJEVzFX17PTLaNqr8LrTzZB6NS
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ksAHb4VqXXnVES5
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E9100AA472
5146.46 MK/s (GPU 5146.46 MK/s) (2^39.72) [00:02:54 RUN || END 00:00:37][70]
Public Addr: 1PWo3Jese8NnywVYLo4S7dDtAjt9XgVvSa
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kr4KZAsF1ssNr9A
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000D56EB22D6B
5122.24 MK/s (GPU 5122.24 MK/s) (2^39.77) [00:03:00 RUN || END 00:00:31][71]
Public Addr: 1PWo3Jep5QuFC1S8Jd27qjoTT24PWVCfyt
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krQcbmpLAZst6ac
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000DBA9097C08

Public Addr: 1PWo3Jefstug95HjcJZkBTKC18gXwLX5fw
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ks1cRwNhdC1nMc5
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E6668026A0

Public Addr: 1PWo3Je5W5hnnTPThPp1TMy45R5HxDv9pZ
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kro6MMrZsLsVTdE
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E28F017F77

Public Addr: 1PWo3Jedxd1Kgq4zMDpvVaeoje92G42FVK
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krihoaAHoXDTUn5
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E1363693DF

Public Addr: 1PWo3JeaUpFZNbcHyHD2MQK9jFCvN4iHTa
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krYNpc6czAr4kVN
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000DE0ADFE8BD
5114.45 MK/s (GPU 5114.45 MK/s) (2^39.82) [00:03:06 RUN || END 00:00:25][76]
Public Addr: 1PWo3JeR6NAkim3QyE8FcnmxmhCk8eHTAi
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krWrhpEEMYjoMv9
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000DD93847CB4

Public Addr: 1PWo3JefV9tbr6TkNmDfXsqZYYgtnrGbL6
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ks6eGDcGev4DZDQ
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E7F1CBC437

Public Addr: 1PWo3JeL6QYumwQZuHE89Hj2ymLxgv1KYN
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqxC2J88RADUkVE
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000D38D1E0588

Public Addr: 1PWo3JeVHTeUQnzjec6cr34WP1sT86fsCC
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ks61xdp1BCENUSA
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E7C09F4F55
5113.83 MK/s (GPU 5113.83 MK/s) (2^39.84) [00:03:08 RUN || END 00:00:22][80]
Public Addr: 1PWo3JewLj7CrHTkk3PQMUp8BoLKbNfUA4
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krkqE6Z6T6gqmWy
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E1DD6498AE
5157.78 MK/s (GPU 5157.78 MK/s) (2^39.89) [00:03:17 RUN || END 00:00:14][81]
Public Addr: 1PWo3JeGG9ZD9yHpsoUEtCP8WZCKMf7xC8
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ksubNeAUuwfhkhX
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000F65A53DC8D

Public Addr: 1PWo3JeynV1d7VSYmEqsD7DoxpVvnop4rT
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ksUVdjaUieAQAue
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000EEA67C7EA0

Public Addr: 1PWo3JekQFTr9qgXjsyPjVneTpX2Qc2mB9
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kt7Xjnk1WoYfD6n
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000FA0427C321
5168.56 MK/s (GPU 5168.56 MK/s) (2^39.96) [00:03:25 RUN || END 00:00:06][84]
Public Addr: 1PWo3JeVbnYoxBs9cjrDgVAQznyiqpPTFB
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kse13QRzeYP8NVE
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000F1916267EA
5380.98 MK/s (GPU 5380.98 MK/s) (2^40.00) [00:03:31 RUN || END 00:00:00][85]
Public Addr: 1PWo3JeWL6TpWqMDNaFvBussA6vW4S8Bz2
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kt2miuBtD6dNCXf
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000F88E48DE89

Public Addr: 1PWo3Je9Jc7wiMvUoH571GXZdgd1Ew4M7c
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kuSaAkDsohm6R6S
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000111A8C5B6DF
[EXIT] Range research completed (2^40.01) [00:03:33 RUN || END ...finishing][87]
Current task END time: Fri Dec  5 10:14:03 2025

Code:
VanitySearch-Bitcrack v2.2 by FixedPaul
[keyspace]  range=2^40
[keyspace]  start=20000000000000000
[keyspace]    end=2000000FFFFFFFFFF
Search: 1PWo3Je [Compressed]
Current task START time: Fri Dec  5 10:16:29 2025
GPU: GPU #0 NVIDIA GeForce RTX 4090 (128x128 cores) Grid(16384x256)
Starting keys set in 0.60 seconds
6880.8 MK/s - 26 BKeys - 2^34.58 [2.34%] - RUN: 00:00:03.6|END: 00:02:31.1 - Found: 0
Public Addr: 1PWo3JeNyJHprvMyG83MJ2w7rqtM4dQTr2
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kerT1aGPjn3ZJ1q
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000DFF10199D


Public Addr: 1PWo3JewLk1m1L2PYeM5Y9Bk8pM8BcBd67
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ko8zt9LtPmS82ds
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000A178501A10

7193.2 MK/s - 39 BKeys - 2^35.17 [3.52%] - RUN: 00:00:05.4|END: 00:02:29.7 - Found: 2
Public Addr: 1PWo3Jefstug95HjcJZkBTKC18gXwLX5fw
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ks1cRwNhdC1nMc5
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E6668026A0

7177.3 MK/s - 47 BKeys - 2^35.46 [4.30%] - RUN: 00:00:06.6|END: 00:02:28.0 - Found: 3
Public Addr: 1PWo3Je1NkW54CRFCBngUHwwZCFpKDDK2m
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knaU61oFsaVobvJ
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000977C982FAD

6816.8 MK/s - 103 BKeys - 2^36.58 [9.38%] - RUN: 00:00:14.6|END: 00:02:21.8 - Found: 4
Public Addr: 1PWo3JeRfVg3RjFL9aM2Sb8EcBHxGuZXTq
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kgrmBuK6RKYbCy5
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000031B0F46166

7194.9 MK/s - 125 BKeys - 2^36.86 [11.33%] - RUN: 00:00:17.6|END: 00:02:18.3 - Found: 5
Public Addr: 1PWo3Jed442wzBXPWBnAWJkxsM7e8AaGvh
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4koXyBh7u9Tayvpk
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000A884F47589

7170.7 MK/s - 133 BKeys - 2^36.95 [12.11%] - RUN: 00:00:18.8|END: 00:02:16.9 - Found: 6
Public Addr: 1PWo3JeR6NAkim3QyE8FcnmxmhCk8eHTAi
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krWrhpEEMYjoMv9
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000DD93847CB4


Public Addr: 1PWo3JeynV1d7VSYmEqsD7DoxpVvnop4rT
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ksUVdjaUieAQAue
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000EEA67C7EA0

7217.3 MK/s - 159 BKeys - 2^37.21 [14.45%] - RUN: 00:00:22.4|END: 00:02:12.8 - Found: 8
Public Addr: 1PWo3JeVFjnLzneKD7ruPPYS9af9CXT2NC
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knpDs3LBL6FZeoe
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000009BB5349414

7230.9 MK/s - 163 BKeys - 2^37.25 [14.84%] - RUN: 00:00:23.0|END: 00:02:12.1 - Found: 9
Public Addr: 1PWo3JewLj7CrHTkk3PQMUp8BoLKbNfUA4
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krkqE6Z6T6gqmWy
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E1DD6498AE

7187.6 MK/s - 168 BKeys - 2^37.29 [15.23%] - RUN: 00:00:23.6|END: 00:02:11.4 - Found: 10
Public Addr: 1PWo3JevCHbRL4KoR71WR3RBkezFL5AmbD
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kn9dEpZ3yJ9aPXf
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000008FDCEC9EE4

7215.2 MK/s - 180 BKeys - 2^37.39 [16.41%] - RUN: 00:00:25.4|END: 00:02:09.5 - Found: 11
Public Addr: 1PWo3JedQxvrgmQ7rDUxQL3P9KuhzArauv
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpyPfYRAprTabVJ
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C21ED0AAB6

7198.3 MK/s - 206 BKeys - 2^37.58 [18.75%] - RUN: 00:00:28.9|END: 00:02:05.6 - Found: 12
Public Addr: 1PWo3JeEwBnrj4XA4CNgbzrR6h5Dp3WGnz
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kkNcwW7LticvphP
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000704090C3ED

7061.6 MK/s - 232 BKeys - 2^37.75 [21.09%] - RUN: 00:00:32.6|END: 00:02:02.0 - Found: 13
Public Addr: 1PWo3Jewkh71KfvWF5ky9TZwvC77mWNTB2
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4keduBCdNSRhyASz
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000A2530DA88


Public Addr: 1PWo3JeeR5aZdF3jTCSBXUeD7JjhubkJjT
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpK6rMvcvb9RFSB
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B65EA8D922

7028.0 MK/s - 236 BKeys - 2^37.78 [21.48%] - RUN: 00:00:33.2|END: 00:02:01.4 - Found: 15
Public Addr: 1PWo3Jeh956tujCUiVydBMRLEmVzGFQYtL
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4km4Wqyicp7ivGXT
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000007C7ED0DC3C


Public Addr: 1PWo3JeWL6TpWqMDNaFvBussA6vW4S8Bz2
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kt2miuBtD6dNCXf
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000F88E48DE89

7125.9 MK/s - 296 BKeys - 2^38.11 [26.95%] - RUN: 00:00:41.6|END: 00:01:53.0 - Found: 17
Public Addr: 1PWo3JeGvmbp1FTF4FExWA41tjXNRoiUea
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqGrdjeYjWp57Wk
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C77AE9150B

7161.5 MK/s - 335 BKeys - 2^38.29 [30.47%] - RUN: 00:00:47.1|END: 00:01:47.4 - Found: 18
Public Addr: 1PWo3JeZKq6oi7uokhshHWP8eUN8o5EE8k
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4khQ6iXsGvHBntQU
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000003B4ED93BDF

7131.6 MK/s - 339 BKeys - 2^38.30 [30.86%] - RUN: 00:00:47.7|END: 00:01:46.8 - Found: 19
Public Addr: 1PWo3Je8CUY5byN647YyHeozqiXhuUMPWm
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knu2L4fUJWvwFAN
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000009D2E653C59

7189.4 MK/s - 344 BKeys - 2^38.32 [31.25%] - RUN: 00:00:48.3|END: 00:01:46.2 - Found: 20
Public Addr: 1PWo3JeaySN7L9BJCPAyMqsLLoGmefPVNm
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knG96PiwvnULnUg
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000091DCBD43A4

7145.8 MK/s - 348 BKeys - 2^38.34 [31.64%] - RUN: 00:00:48.9|END: 00:01:45.6 - Found: 21
Public Addr: 1PWo3JeCNyne35RYP8JPTvWpjUx1haqggb
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjtGnx3jQKQFCZX
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000678D854556

7181.5 MK/s - 365 BKeys - 2^38.41 [33.20%] - RUN: 00:00:51.3|END: 00:01:43.2 - Found: 22
Public Addr: 1PWo3JeGKzTn8x5VstZw77WctBjxFqfVnW
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4km16iRSRnywCubg
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000007B7271552C

7161.6 MK/s - 382 BKeys - 2^38.48 [34.77%] - RUN: 00:00:53.6|END: 00:01:40.7 - Found: 23
Public Addr: 1PWo3JeM3aMVBTmdfFFt7pkQxdPpVgyJcW
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kkWRH97C3zc2d3Y
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000072A5456555

7171.5 MK/s - 408 BKeys - 2^38.57 [37.11%] - RUN: 00:00:57.2|END: 00:01:37.0 - Found: 24
Public Addr: 1PWo3Jep5QuFC1S8Jd27qjoTT24PWVCfyt
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krQcbmpLAZst6ac
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000DBA9097C08


Public Addr: 1PWo3Je5W5hnnTPThPp1TMy45R5HxDv9pZ
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kro6MMrZsLsVTdE
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E28F017F77

7157.9 MK/s - 434 BKeys - 2^38.66 [39.45%] - RUN: 00:01:00.8|END: 00:01:33.4 - Found: 26
Public Addr: 1PWo3JeXwdo9buxC5HYnksVH6hoJGKqhDe
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kmWaagyysSwAkrf
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000847E81955B

7165.3 MK/s - 447 BKeys - 2^38.70 [40.63%] - RUN: 00:01:02.6|END: 00:01:31.6 - Found: 27
Public Addr: 1PWo3JeuZ5SjzYp8SYicx2Mu5hgKaqxKhk
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfp7C1QdXTcxDXd
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000001F13B9A373

7167.3 MK/s - 464 BKeys - 2^38.75 [42.19%] - RUN: 00:01:05.0|END: 00:01:29.2 - Found: 28
Public Addr: 1PWo3Jej7pQyXkdY36JcKGLJNKSPbta4QR
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpN1BJvhfwLVtw3
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B742A9B3CE

7168.3 MK/s - 468 BKeys - 2^38.77 [42.58%] - RUN: 00:01:05.6|END: 00:01:28.5 - Found: 29
Public Addr: 1PWo3JeKBLqaCKwSXw3Va2ZjSVLv6ED3od
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kgRDyBFoZbZ5BRP
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000029DA99B6DC

7155.3 MK/s - 541 BKeys - 2^38.98 [49.22%] - RUN: 00:01:15.9|END: 00:01:18.3 - Found: 30
Public Addr: 1PWo3JeHF4QfW8MuyEWdj7x5ybpd6DZURe
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfLAiKeAWjkjk28
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000001680BDFB01


Public Addr: 1PWo3JepgC86tBLWV5cCdimg5p1TCLpQxi
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjRnHMXHBjXg4DL
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005F6C45FB15

7132.2 MK/s - 550 BKeys - 2^39.00 [50.00%] - RUN: 00:01:17.1|END: 00:01:17.1 - Found: 32
Public Addr: 1PWo3JegNEK3ayZNTkA9rwfrapcyUPmttW
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfM4iQtA17wCgpR
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000016C72E01B1

7156.3 MK/s - 554 BKeys - 2^39.01 [50.39%] - RUN: 00:01:17.7|END: 00:01:16.5 - Found: 33
Public Addr: 1PWo3Je3zaYTVTY7do4g1k2P3CZdP24p3L
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfetJoaNMqvfABY
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000001C3F360535


Public Addr: 1PWo3JeL6QYumwQZuHE89Hj2ymLxgv1KYN
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqxC2J88RADUkVE
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000D38D1E0588

7171.9 MK/s - 567 BKeys - 2^39.04 [51.56%] - RUN: 00:01:19.5|END: 00:01:14.7 - Found: 35
Public Addr: 1PWo3Je2muLW8JF2ZVHUKkYetpuoVLU6yD
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kghCJnFGFZNxWGK
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000002EC15A1116


Public Addr: 1PWo3JefKEBDixWNeymPmWtNBsBgDAeR2R
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kmyhKJnQB4ShdMP
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000008CD0D2102F

7155.6 MK/s - 584 BKeys - 2^39.09 [53.13%] - RUN: 00:01:21.9|END: 00:01:12.3 - Found: 37
Public Addr: 1PWo3JesheDWC3kipKnAQreArtjVnUQz4p
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqQj8yFkeUKpDUP
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C9E5422006

7150.0 MK/s - 597 BKeys - 2^39.12 [54.30%] - RUN: 00:01:23.7|END: 00:01:10.5 - Found: 38
Public Addr: 1PWo3JegduHkrk556eofwDvT68GbZ9J6kS
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kg5YsyLqLs3XPaE
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000023D0F62EAE


Public Addr: 1PWo3Jese8NnywVYLo4S7dDtAjt9XgVvSa
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kr4KZAsF1ssNr9A
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000D56EB22D6B

7125.5 MK/s - 606 BKeys - 2^39.14 [55.08%] - RUN: 00:01:24.9|END: 00:01:09.2 - Found: 40
Public Addr: 1PWo3JevBoWspcTsnvVYCx2Hq9Sej1rW8U
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4km8CSNLJsDZCMLJ
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000007DA0223450

7158.6 MK/s - 610 BKeys - 2^39.15 [55.47%] - RUN: 00:01:25.5|END: 00:01:08.6 - Found: 41
Public Addr: 1PWo3JeorcGmYVVVGtpb8HjT7b9t8BhsTg
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpLX3b1faDYi2da
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B6CDFE3A61

7140.9 MK/s - 614 BKeys - 2^39.16 [55.86%] - RUN: 00:01:26.1|END: 00:01:08.0 - Found: 42
Public Addr: 1PWo3JerAEen8VMQb5tmXBUU7rVCgrwd32
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjRj3PmwK1gHG8b
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005F67E23C04

7171.5 MK/s - 627 BKeys - 2^39.19 [57.03%] - RUN: 00:01:27.9|END: 00:01:06.2 - Found: 43
Public Addr: 1PWo3JeLDcwhRmbEkJPCyskyBui3EwvRER
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kkpBsixfvr5q6nC
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000078193E4829


Public Addr: 1PWo3JeYS9VYJ576fq1Ff2FyJ98cfB7dXj
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knB1GysuAqkbx3W
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000904956495D

7162.0 MK/s - 649 BKeys - 2^39.24 [58.98%] - RUN: 00:01:30.9|END: 00:01:03.2 - Found: 45
Public Addr: 1PWo3JemR25JDWry5vKSGLqquBq6xAVA98
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kf7J7LdSnfT8nTa
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000128D725C59

7156.1 MK/s - 657 BKeys - 2^39.26 [59.77%] - RUN: 00:01:32.1|END: 00:01:02.0 - Found: 46
Public Addr: 1PWo3Je2crkWDmyd9dDX7aiTfEBkAA2qdt
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjcoYGswJCemKVS
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000062CE2A66D7


Public Addr: 1PWo3JeVbnYoxBs9cjrDgVAQznyiqpPTFB
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kse13QRzeYP8NVE
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000F1916267EA

7114.4 MK/s - 666 BKeys - 2^39.28 [60.55%] - RUN: 00:01:33.3|END: 00:01:00.8 - Found: 48
Public Addr: 1PWo3JekDpiCiUvRG3KNT4X8j557M63cLA
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kijaFDeVM1NhVvd
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005315766C3C

7144.7 MK/s - 674 BKeys - 2^39.29 [61.33%] - RUN: 00:01:34.5|END: 00:00:59.6 - Found: 49
Public Addr: 1PWo3JeEiEjz13PeJZPev326NSh4gnKV2w
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4khzB3Pt8nA8EKDA
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000045C3D6778F


Public Addr: 1PWo3JeS3GLD5na3W3ycfMib47gxq3QptD
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjFKqNN2W7Hbe1c
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005C36D27621

7175.0 MK/s - 704 BKeys - 2^39.36 [64.06%] - RUN: 00:01:38.7|END: 00:00:55.4 - Found: 51
Public Addr: 1PWo3Jewsm26TR5agk5YVyGDGkpFaerVwP
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kj2aiZAj22ksV29
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000584DAA91F5


Public Addr: 1PWo3Jedxd1Kgq4zMDpvVaeoje92G42FVK
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krihoaAHoXDTUn5
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E1363693DF

7125.9 MK/s - 713 BKeys - 2^39.38 [64.84%] - RUN: 00:01:39.9|END: 00:00:54.2 - Found: 53
Public Addr: 1PWo3JefkKPeib2LsGg4ZGAxbdDvub4jDa
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kgSBU8qQVpfibQU
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000002A25C69BBC

7149.5 MK/s - 726 BKeys - 2^39.40 [66.02%] - RUN: 00:01:41.7|END: 00:00:52.3 - Found: 54
Public Addr: 1PWo3JeFkJEVzFX17PTLaNqr8LrTzZB6NS
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ksAHb4VqXXnVES5
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E9100AA472

7130.6 MK/s - 747 BKeys - 2^39.44 [67.97%] - RUN: 00:01:44.7|END: 00:00:49.3 - Found: 55
Public Addr: 1PWo3JeYDRPnUzjaf7azEnEA2Gg6tzh7HV
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4koimrKFimgJB1gG
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000ABD5CAB855


Public Addr: 1PWo3Je2WbBGoCo3VtWtKfApGwUYLVSoSh
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqJCSmR3JeEU3JA
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C7E44EBA7B

7192.0 MK/s - 786 BKeys - 2^39.52 [71.48%] - RUN: 00:01:50.1|END: 00:00:43.9 - Found: 57
Public Addr: 1PWo3JeJS9ZEYArbbW9XzCvstJdyfV6gug
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4km5UGSXNTrxTA6X
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000007CC9E2DFBC

7133.9 MK/s - 803 BKeys - 2^39.55 [73.05%] - RUN: 00:01:52.5|END: 00:00:41.5 - Found: 58
Public Addr: 1PWo3Je8pVETQTD8jTukwVCex4K711GiDW
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kekBQrxPTGUTwvT
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000C128EED6A

7143.0 MK/s - 807 BKeys - 2^39.55 [73.44%] - RUN: 00:01:53.1|END: 00:00:40.9 - Found: 59
Public Addr: 1PWo3JePFTQ9WxaXZWZu7ZNB3frktDjyAF
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kq45U8Ewi3vY1yD
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C38EFAF394

7163.0 MK/s - 846 BKeys - 2^39.62 [76.95%] - RUN: 00:01:58.5|END: 00:00:35.5 - Found: 60
Public Addr: 1PWo3JeMNcD4GY2gxYAxqz4DqpsoEeh77n
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kfGe6s4Jw27BDhR
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000156B971536

7144.0 MK/s - 850 BKeys - 2^39.63 [77.34%] - RUN: 00:01:59.2|END: 00:00:34.9 - Found: 61
Public Addr: 1PWo3JeTQheUtU64LbNTHasBvuuD4YzvLj
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjDf89M9rbx5Fdd
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005BB3D31993

7145.0 MK/s - 863 BKeys - 2^39.65 [78.52%] - RUN: 00:02:01.0|END: 00:00:33.1 - Found: 62
Public Addr: 1PWo3Jewqu9jfFk7zRsnDKCShr3zeuU36R
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpUbhyvriQsbXSg
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B948CF2675

7156.6 MK/s - 880 BKeys - 2^39.68 [80.08%] - RUN: 00:02:03.4|END: 00:00:30.7 - Found: 63
Public Addr: 1PWo3JeH1TSwSMtW5Mk8JaUzZBtPEJsCPx
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kgQDvkyw7jrMYQt
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000298BFB368A


Public Addr: 1PWo3JeP7PHTpzcUiRvyECjszLfeutAdVN
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kpSH5VHqCv4Bj8U
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B89273375B

7026.9 MK/s - 906 BKeys - 2^39.72 [82.42%] - RUN: 00:02:07.0|END: 00:00:27.0 - Found: 65
Public Addr: 1PWo3JeVHTeUQnzjec6cr34WP1sT86fsCC
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ks61xdp1BCENUSA
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E7C09F4F55

7151.5 MK/s - 919 BKeys - 2^39.74 [83.59%] - RUN: 00:02:08.8|END: 00:00:25.2 - Found: 66
Public Addr: 1PWo3JeGdk3H1coTdB4E1HAAigMWkMM57k
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kp4aFDPoBYfQdJ5
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000B1E95359A9

7146.6 MK/s - 923 BKeys - 2^39.75 [83.98%] - RUN: 00:02:09.4|END: 00:00:24.6 - Found: 67
Public Addr: 1PWo3Je2w5aecwYbZdsGQ7ze2fErLULPQf
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kejsvena7afPLAV
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000BFADF5CF4

7155.7 MK/s - 949 BKeys - 2^39.79 [86.33%] - RUN: 00:02:13.0|END: 00:00:21.0 - Found: 68
Public Addr: 1PWo3JearhKNBnvyKhLZ4zkHp8BUsAJAZ8
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kiuGmi277VzcFV5
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000560F6B74ED

7137.5 MK/s - 953 BKeys - 2^39.79 [86.72%] - RUN: 00:02:13.6|END: 00:00:20.4 - Found: 69
Public Addr: 1PWo3JeKEkqv7SXzpFYzgFuQtBUfMVMV7Q
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ker1vxBJtPfkRXa
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000000DDD177B6D

7123.8 MK/s - 958 BKeys - 2^39.80 [87.11%] - RUN: 00:02:14.2|END: 00:00:19.8 - Found: 70
Public Addr: 1PWo3JeHbgMvwVxbRzFbC5qwNeLM1KXK6F
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kkBoLrHnFJVdmns
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000006CEE777C5D


Public Addr: 1PWo3JeXPnaDXJVM7BJFFdGsZinKVPjzAj
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4koavkLhSj3D5kVr
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000A96D577EF4

7158.0 MK/s - 979 BKeys - 2^39.83 [89.06%] - RUN: 00:02:17.2|END: 00:00:16.8 - Found: 72
Public Addr: 1PWo3JeSm93uvPTBMe4DMsdRo1c2v8oV91
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kiquNf1X2949uGi
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005506BF9104

7128.8 MK/s - 988 BKeys - 2^39.85 [89.84%] - RUN: 00:02:18.4|END: 00:00:15.6 - Found: 73
Public Addr: 1PWo3JeX4DMwSXRVUAe933zF2D33xJxLjq
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqvnGzMBfUQAfu7
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000D31E639A34

7167.8 MK/s - 1014 BKeys - 2^39.88 [92.19%] - RUN: 00:02:22.0|END: 00:00:12.0 - Found: 74
Public Addr: 1PWo3JeKjSQTYZdh5joG42hKyz4eneG9U3
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqfc91iR8pQfNXm
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000CE7637B12A

7151.0 MK/s - 1031 BKeys - 2^39.91 [93.75%] - RUN: 00:02:24.4|END: 00:00:09.6 - Found: 75
Public Addr: 1PWo3Jedwac7qvLEy3jYmWzeqSjit72TMZ
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ki784H45AhDFXu9
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000047E5BBC1D5


Public Addr: 1PWo3Je5pkEwDZbkLnY4ssg7sBccQVtQ4g
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4knpGLkSB76Uevw8
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000009BB88FC1A9


Public Addr: 1PWo3JekQFTr9qgXjsyPjVneTpX2Qc2mB9
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kt7Xjnk1WoYfD6n
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000FA0427C321

7160.8 MK/s - 1035 BKeys - 2^39.91 [94.14%] - RUN: 00:02:25.0|END: 00:00:09.0 - Found: 78
Public Addr: 1PWo3JefV9tbr6TkNmDfXsqZYYgtnrGbL6
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ks6eGDcGev4DZDQ
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000E7F1CBC437

7105.6 MK/s - 1039 BKeys - 2^39.92 [94.53%] - RUN: 00:02:25.6|END: 00:00:08.4 - Found: 79
Public Addr: 1PWo3JeUTADQ16CevGQ5DELCvSJGXt5r6S
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kjJbDR3z57QKU3g
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000005D3757C8B0

7155.5 MK/s - 1057 BKeys - 2^39.94 [96.09%] - RUN: 00:02:28.0|END: 00:00:06.0 - Found: 80
Public Addr: 1PWo3Je5aYoc1d4H3JKpoHB46LdVNQpPvE
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqbaSicakQU8kgA
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000CD39ABDBA1

7159.1 MK/s - 1061 BKeys - 2^39.95 [96.49%] - RUN: 00:02:28.6|END: 00:00:05.4 - Found: 81
Public Addr: 1PWo3JeGG9ZD9yHpsoUEtCP8WZCKMf7xC8
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4ksubNeAUuwfhkhX
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000F65A53DC8D

7140.4 MK/s - 1074 BKeys - 2^39.97 [97.66%] - RUN: 00:02:30.4|END: 00:00:03.6 - Found: 82
Public Addr: 1PWo3JeaUpFZNbcHyHD2MQK9jFCvN4iHTa
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4krYNpc6czAr4kVN
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000DE0ADFE8BD

7165.7 MK/s - 1087 BKeys - 2^39.98 [98.83%] - RUN: 00:02:32.2|END: 00:00:01.8 - Found: 83
Public Addr: 1PWo3JeLXdHd8q1Sjo169aUXoLkAd39RDq
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kqFHyUDHYxrMKEa
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000C7001BF68A

7149.9 MK/s - 1091 BKeys - 2^39.99 [99.22%] - RUN: 00:02:32.8|END: 00:00:01.2 - Found: 84
Public Addr: 1PWo3JexCfDsYENDp8iw71BMz8nWXUubed
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kf8wsQe2L5uPs4L
Priv (HEX): 0x000000000000000000000000000000000000000000000002000000130F27F874

7117.6 MK/s - 1095 BKeys - 2^39.99 [99.61%] - RUN: 00:02:33.4|END: 00:00:00.6 - Found: 85
Public Addr: 1PWo3Je7mwXX8JNttLhb3pucZxcArmjVnh
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZUL4kiV1CkBohwVSULZ
Priv (HEX): 0x0000000000000000000000000000000000000000000000020000004E9CD3FD62

7124.9 MK/s - 1100 BKeys - 2^40.00 [100.00%] - RUN: 00:02:34.0|END: 00:00:00.0 - Found: 86
Range Finished! - Average Speed: 7135.4 [MK/s] - Found: 86
Current task END time: Fri Dec  5 10:19:04 2025

Honestly, I wasn’t able to reproduce the issue you found. The only difference, aside from the speed, is that the “old version” finds one extra prefix:

Public Addr: 1PWo3Je9Jc7wiMvUoH571GXZdgd1Ew4M7c
Priv (HEX): 0x00000000000000000000000000000000000000000000000200000111A8C5B6DF

But this key is outside the range, because older VS versions made the GPU perform unnecessary work when the size of the range wasn’t a multiple of the number of threads.
kTimesG
Full Member
***
Offline Offline

Activity: 700
Merit: 220


View Profile
December 05, 2025, 10:04:21 AM
 #12148

You truly don’t understand what you’re saying if you claim that the Kangaroo algorithm does not use the Birthday Paradox.

The Kangaroo algorithm does not use the birthday paradox.

It is in the literature, it is in the academic papers, it is written in black over white, with subject and predicate, that the Kangaroo algorithm does not use the birthday paradox.

It's not a stupid claim generated by a non-sense AI. It is a hard fact accompanied by multiple evidence. Period. So, wherever you see that Kangaroo uses the birthday paradox, or that it is based on the birthday paradox, or that it works due to the birthday paradox, that is an error. But - you will only find such statements from people who are not aware that Kangaroo does not use the birthday paradox, and there are zero scientific papers that make such a wrong statement, because real science gets peer reviewed, and such a gross error would never make it to the community. In contrast, 607 pages of viral trash can contain whatever shit people dream at night.

Off the grid, training pigeons to broadcast signed messages.
bibilgin
Newbie
*
Offline Offline

Activity: 275
Merit: 0


View Profile
December 05, 2025, 10:36:50 AM
 #12149

You truly don’t understand what you’re saying if you claim that the Kangaroo algorithm does not use the Birthday Paradox.

The Kangaroo algorithm does not use the birthday paradox.

It is in the literature, it is in the academic papers, it is written in black over white, with subject and predicate, that the Kangaroo algorithm does not use the birthday paradox.

It's not a stupid claim generated by a non-sense AI. It is a hard fact accompanied by multiple evidence. Period. So, wherever you see that Kangaroo uses the birthday paradox, or that it is based on the birthday paradox, or that it works due to the birthday paradox, that is an error. But - you will only find such statements from people who are not aware that Kangaroo does not use the birthday paradox, and there are zero scientific papers that make such a wrong statement, because real science gets peer reviewed, and such a gross error would never make it to the community. In contrast, 607 pages of viral trash can contain whatever shit people dream at night.

https://faculty.uml.edu/rmontenegro/research/kangaroo.pdf

https://arxiv.org/pdf/0812.0789

We would like you to review the article here and tell us what you understand.
brainless
Member
**
Online Online

Activity: 451
Merit: 35


View Profile
December 05, 2025, 12:02:13 PM
 #12150

Again in short
What program he wish to use, doesn't matter
Only his plan to use 100s gpu to gather dp for his database for finding 135 in given 200$ , greedy dreams to greedy people

13sXkWqtivcMtNGQpskD78iqsgVy9hcHLF
Torin Keepler
Newbie
*
Offline Offline

Activity: 22
Merit: 0


View Profile
December 05, 2025, 12:08:25 PM
Last edit: December 05, 2025, 06:58:53 PM by hilariousandco
 #12151

You truly don’t understand what you’re saying if you claim that the Kangaroo algorithm does not use the Birthday Paradox.

The Kangaroo algorithm does not use the birthday paradox.

It is in the literature, it is in the academic papers, it is written in black over white, with subject and predicate, that the Kangaroo algorithm does not use the birthday paradox.

It's not a stupid claim generated by a non-sense AI. It is a hard fact accompanied by multiple evidence. Period. So, wherever you see that Kangaroo uses the birthday paradox, or that it is based on the birthday paradox, or that it works due to the birthday paradox, that is an error. But - you will only find such statements from people who are not aware that Kangaroo does not use the birthday paradox, and there are zero scientific papers that make such a wrong statement, because real science gets peer reviewed, and such a gross error would never make it to the community. In contrast, 607 pages of viral trash can contain whatever shit people dream at night.

The birthday paradox states that a collision (a match) occurs much earlier than intuition suggests: for two people to share one birthday out of 365 possible dates, only 23 people are enough for the probability of a match to be about 50%.

In Pollard's Kangaroo algorithm, the same idea appears as follows:

1. Two random walks (tame and wild) move through a large state space.
2. Even though the space is huge, a collision occurs after roughly the square root of the range.
3. This early encounter makes it possible to compute the unknown key.

So the paradoxical and unexpected frequency of collisions from the birthday paradox is mathematically reflected in the fact that the kangaroo algorithm finds a collision and solves the problem in square-root time relative to the interval size, rather than linearly.

1. First you demanded the SHA-256 hash of the public key as proof of ownership of the public key. I provided it, but you still had no idea what to do with it.
2. Then you claimed that Pollard's Kangaroo algorithm is not used in the RCKangaroo program, yet you were unable to explain why its very name clearly refers to that algorithm.
3. Later you started insisting that RCKangaroo uses the Gaudry–Schost algorithm, but you still could not provide even a short code example showing where exactly this algorithm is used.
4. And now you fail to see the connection between the birthday paradox and the Kangaroo algorithm.


At first I thought you were simply mistaken. But the fact that you fail to grasp such elementary concepts suggests something else entirely – you're not just unfamiliar with this topic; you seem to be far removed from mathematics as a whole.

Again in short
What program he wish to use, doesn't matter
Only his plan to use 100s gpu to gather dp for his database for finding 135 in given 200$ , greedy dreams to greedy people

If you can answer for yourself how a challenge in the 110–115-bit range could possibly help solve Puzzle-135, you will understand that there is no direct connection at all. And yes, the challenge will take place, and the prize will soon find its winners. Before seeing some kind of conspiracy, first answer a simple question: what is the relationship between a 115-bit challenge and using this approach to search for 135 bits, given that 115 bits can be solved within about eight days on normal hardware, and there is no reason whatsoever to involve a large number of people for that.

https://t.me/puzzle135/14976

The purpose of this challenge is to demonstrate the effectiveness of the program and the approach, with a reward of 200 dollars. Yes, I do hope that after seeing how the program works, some people might want to try searching for the 135 puzzle as well. Moreover, the profit-sharing model in case the 135 puzzle is found is very fair. But the 200-dollar challenge itself is not directly connected to participating in solving Puzzle 135. And anyone who finds the 200 dollars has no obligation whatsoever to search for Puzzle 135.
kTimesG
Full Member
***
Offline Offline

Activity: 700
Merit: 220


View Profile
December 05, 2025, 12:37:37 PM
Last edit: December 05, 2025, 12:51:41 PM by kTimesG
 #12152

https://faculty.uml.edu/rmontenegro/research/kangaroo.pdf

https://arxiv.org/pdf/0812.0789

We would like you to review the article here and tell us what you understand.

Who's "we"?

If you actually read those, there is absolutely no sentence in either of those that says Kangaroo uses the Birthday Paradox.

I'm gonna post again the PDF on which RetiredCoder has based his RCKang proof of concept:

https://scispace.com/pdf/using-equivalence-classes-to-accelerate-solving-the-discrete-uzjbi3yc92.pdf

and here is some quote on the subject (it is literally spread all over the paper why it's based on Gaudry-Schost, and why it is different than Kangaroo).

Jesus ....

Quote
The kangaroo method is not analysed using the birthday paradox but using
the mean step size m of the pseudorandom walks. Once the rear kangaroo reaches
the starting point of the front kangaroo it is jumping over a region where roughly
one in m group elements have been visited by the front kangaroo. Hence, there
is a roughly 1/m probability at each step that the back kangaroo lands on a
footprint of the front kangaroo. Therefore, the walks collide after an expected
m steps

And here is the very same quote from

https://eprint.iacr.org/2010/617.pdf

by John M. Pollard himself. Exact quote below

Quote
The kangaroo method is not analysed using the birthday paradox but using the mean step size m of the
pseudorandom walks. Once the rear kangaroo reaches the starting point of the front kangaroo it is jumping
over a region where roughly one in m group elements have been visited by the front kangaroo. Heuristically,
there is therefore a 1/m probability at each step that the back kangaroo lands on a footprint of the front
kangaroo. Hence, the walks join after an expected m steps.

Quote
Gaudry and Schost [6] developed a different approach to algorithms for solving the DLP. Their method
involves pseudorandom walks of different types (typically, “tame” walks and “wild” walks) in subsets of the
group. One applies a version of the birthday paradox in the regions of overlap of the subsets. A collision
between walks of two different types leads to a solution to the DLP. Galbraith and Ruprai [3, 4] have shown
that the Gaudry-Schost method can have some advantages over the Pollard kangaroo method. In particular,
it can be used to efficiently solve the DLP in an interval when using equivalence classes under inversion

Stop treating AI output as real science.

Off the grid, training pigeons to broadcast signed messages.
fixedpaul
Member
**
Offline Offline

Activity: 83
Merit: 26


View Profile WWW
December 05, 2025, 01:14:06 PM
 #12153


1. First you demanded the SHA-256 hash of the public key as proof of ownership of the public key. I provided it, but you still had no idea what to do with it.


The sha256 of the public key is used to prove that you at least know it, that you probably also have the private key, and that you didn’t just take some random address with $200 and no outputs from the blockchain.

The hash you provided points to the address 1KJGAauQRAkRtuuLxLQTvjz3vHvTiKqaom, which is not the one you claimed, so nobody can make any use of it. Maybe you're trolling, or maybe you just messed up a copy&paste, it happens. Maybe you really did compute the sha256(public key), but you need to hash the binary, not some textual encoding. I’m not sure which scenario is worse.
Torin Keepler
Newbie
*
Offline Offline

Activity: 22
Merit: 0


View Profile
December 05, 2025, 01:23:20 PM
Last edit: December 05, 2025, 06:58:12 PM by hilariousandco
 #12154

Here are the links to the sources that directly analyze the birthday paradox in Markov chains.
1. https://www.researchgate.net/publication/1901441_A_Birthday_Paradox_for_Markov_Chains_with_an_Optimal_Bound_for_Collision_in_the_Pollard_Rho_Algorithm_for_Discrete_Logarithm
Here is the actual title of the work.
"A Birthday Paradox for Markov chains, withan optimal bound for collision inthe Pollard Rho Algorithm for Discrete Logarithm"

2.https://faculty.uml.edu/rmontenegro/research/kangaroo.pdf?utm_source
Here is a quotation from this work.
"A Birthday Attack is a common approach towards solving these problems, and although heuristics
can be given for the time complexity of these methods, rigorous results are rare.
In [3] we examined one such method, namely Pollard’s Rho Algorithm to find the discrete logarithm on a cyclic group G, and verified the correctness of commonly held intuition"

Furthermore, I ask you to follow the chronology and answer the questions in order rather than jumping from one to another. Therefore, first explain in your own words and without references why the RCKangaro program is called that, although, according to your statement, it does not use Pollard’s kangaroo algorithm. After that, please send me a code fragment in which, according to your statement, the Gaudry–Schost algorithm is used in the RCKangaro program.


1. First you demanded the SHA-256 hash of the public key as proof of ownership of the public key. I provided it, but you still had no idea what to do with it.


The sha256 of the public key is used to prove that you at least know it, that you probably also have the private key, and that you didn’t just take some random address with $200 and no outputs from the blockchain.

The hash you provided points to the address 1KJGAauQRAkRtuuLxLQTvjz3vHvTiKqaom, which is not the one you claimed, so nobody can make any use of it. Maybe you're trolling, or maybe you just messed up a copy&paste, it happens. Maybe you really did compute the sha256(public key), but you need to hash the binary, not some textual encoding. I’m not sure which scenario is worse.

Proof of ownership of the public key does not play a major role at the moment, because until I provide it to you, the challenge cannot begin, since the search for the private key will be based on the public key. Moreover, I will be able to sign a test message with this private key, or, for example, make a transaction from this address in the amount of 7777 satoshis.
zion3301
Newbie
*
Offline Offline

Activity: 9
Merit: 0


View Profile
December 05, 2025, 01:38:14 PM
 #12155


utm_source=chatgpt.com? 😄
vneos
Jr. Member
*
Offline Offline

Activity: 40
Merit: 12


View Profile
December 05, 2025, 01:46:19 PM
Last edit: December 05, 2025, 06:57:43 PM by hilariousandco
 #12156


every participant can run KeyAuditor locally and check for collisions

if a private key is discovered, everyone will know, because verification is open to all



Could you explain why the verification process of KeyAuditor running locally is open to all?


AI is a tool. There is no problem with it if it is used correctly and the references it provides are double-checked. That is completely normal.


every participant can run KeyAuditor locally and check for collisions

if a private key is discovered, everyone will know, because verification is open to all



Could you explain why the verification process of KeyAuditor running locally is open to all?

The idea is that when using the modified RCKangaro program locally, all the work performed is saved into a file. Later, such files from different participants can be combined, checked for collisions between them, and used to compute the private key - something that cannot be done on a single local machine. In this way, the efficiency of the search increases.
The KeyAuditor program analyzes a database of such files, searches for collisions, and, if one is found, outputs the private key. The program is not network-based and runs locally, so each participant can perform the analysis independently.
kTimesG
Full Member
***
Offline Offline

Activity: 700
Merit: 220


View Profile
December 05, 2025, 02:03:31 PM
 #12157

Here are the links to the sources that directly analyze the birthday paradox in Markov chains.
1. https://www.researchgate.net/publication/1901441_A_Birthday_Paradox_for_Markov_Chains_with_an_Optimal_Bound_for_Collision_in_the_Pollard_Rho_Algorithm_for_Discrete_Logarithm
Here is the actual title of the work.
"A Birthday Paradox for Markov chains, withan optimal bound for collision inthe Pollard Rho Algorithm for Discrete Logarithm"

2.https://faculty.uml.edu/rmontenegro/research/kangaroo.pdf?utm_source
Here is a quotation from this work.
"A Birthday Attack is a common approach towards solving these problems, and although heuristics
can be given for the time complexity of these methods, rigorous results are rare.
In [3] we examined one such method, namely Pollard’s Rho Algorithm to find the discrete logarithm on a cyclic group G, and verified the correctness of commonly held intuition"

Additionally, I ask you to explain, in your own words and without references:
Why is the RCKangaro program called that, although, according to your statement, it does not use Pollard’s kangaroo algorithm?
Please send me a code fragment in which, according to your statement, the Gaudry–Schost algorithm is used in the RCKangaro program.

You are continuing to confuse Pollard's Rho with Pollard's Kangaroo. They are different things. So your AI-based research is not even on the subject at all.

If the direct statements from Pollard are not enough, nothing will be.

Also, your question should be addressed to the owner of the program you mentioned. GitHub repos are not scientific / academic research.

Off the grid, training pigeons to broadcast signed messages.
Torin Keepler
Newbie
*
Offline Offline

Activity: 22
Merit: 0


View Profile
December 05, 2025, 02:34:10 PM
 #12158

Here are the links to the sources that directly analyze the birthday paradox in Markov chains.
1. https://www.researchgate.net/publication/1901441_A_Birthday_Paradox_for_Markov_Chains_with_an_Optimal_Bound_for_Collision_in_the_Pollard_Rho_Algorithm_for_Discrete_Logarithm
Here is the actual title of the work.
"A Birthday Paradox for Markov chains, withan optimal bound for collision inthe Pollard Rho Algorithm for Discrete Logarithm"

2.https://faculty.uml.edu/rmontenegro/research/kangaroo.pdf?utm_source
Here is a quotation from this work.
"A Birthday Attack is a common approach towards solving these problems, and although heuristics
can be given for the time complexity of these methods, rigorous results are rare.
In [3] we examined one such method, namely Pollard’s Rho Algorithm to find the discrete logarithm on a cyclic group G, and verified the correctness of commonly held intuition"

Additionally, I ask you to explain, in your own words and without references:
Why is the RCKangaro program called that, although, according to your statement, it does not use Pollard’s kangaroo algorithm?
Please send me a code fragment in which, according to your statement, the Gaudry–Schost algorithm is used in the RCKangaro program.

You are continuing to confuse Pollard's Rho with Pollard's Kangaroo. They are different things. So your AI-based research is not even on the subject at all.

If the direct statements from Pollard are not enough, nothing will be.

Also, your question should be addressed to the owner of the program you mentioned. GitHub repos are not scientific / academic research.

Here is a link to a more recent work from 2010, where the very first paragraph asserts the connection between the birthday paradox and the kangaroo algorithm.
https://faculty.uml.edu/rmontenegro/research/kangaroo-journal.pdf?utm_source
The citation itself is from the first paragraph of this work.
"This leads to the first sharp analysis of
a non-trivial Birthday attack, proving that Pollard’s Kangaroo method solves the discrete logarithm problem"

Please send me a code fragment in which, according to your statement, the Gaudry–Schost algorithm is used in the RCKangaroo program.
kTimesG
Full Member
***
Offline Offline

Activity: 700
Merit: 220


View Profile
December 05, 2025, 02:49:24 PM
Last edit: December 05, 2025, 03:00:13 PM by kTimesG
 #12159

Here is a link to a more recent work from 2010, where the very first paragraph asserts the connection between the birthday paradox and the kangaroo algorithm.
https://faculty.uml.edu/rmontenegro/research/kangaroo-journal.pdf?utm_source
The citation itself is from the first paragraph of this work.
"This leads to the first sharp analysis of
a non-trivial Birthday attack, proving that Pollard’s Kangaroo method solves the discrete logarithm problem"

Please send me a code fragment in which, according to your statement, the Gaudry–Schost algorithm is used in the RCKangaro program.


Dude, are you for real? I'm going on a broken record here. Kangaroo does not work based on the Birthday Paradox.

Pollard says it himself. The analysis is not based on it. The complexity does not relate to it. The statement above does not say what you are trying to imply (there are two separate propositions there, buddy).

What code fragment do you god damn want? RCKang creates a very big table of points, with arbitrary random distances, and makes side-ways jumps left and right. The starting distances are chosen at random. Do you want me to post the code? It's the entire code branch itself, not enough room to copy paste it here.

These are all the ticking boxes that classifies it as a non-Kangaroo algorithm (even a single one would have sufficed, we have FOUR!). What the fuck do you actually want to prove here anyway? That AI is right, even though all the facts are against this?

Here's, just for fun, a ChatGPT prompt, with zero memory, started from scratch, and simply started with the simple question:

Does Kangaroo use the Birthday Paradox, or not?

Here's the answer (anyone can test for themselves)

Quote
Short answer:

NO, the Kangaroo algorithm (Pollard’s λ) does not use the birthday paradox.

Why not?

The birthday paradox is about the probability of random collisions between independently chosen elements. This idea is fundamental to Pollard’s ρ algorithm, where you look for two different states of a pseudo-random function that collide, creating a cycle.

Pollard’s Kangaroo (λ) works differently:

It does not search for random collisions.

It does not rely on two independently random walks that meet by chance.

Instead, it uses two guided walks (the “tame” kangaroo and the “wild” kangaroo) whose paths are structured so that they will eventually meet deterministically if the discrete log lies in a known interval.

Any “collision” between their paths is not due to the birthday paradox; it is caused by how the algorithm is designed.

What does the Kangaroo algorithm use?

- A set of pseudo-random jump sizes.

- A technique like distinguished points for detecting when paths cross.

- A running time around 𝑂(𝑁1/2), but this is not because of the birthday paradox — it comes from the expected number of steps for two directed walks to close the distance between them in an interval of size 𝑁.

Off the grid, training pigeons to broadcast signed messages.
Torin Keepler
Newbie
*
Offline Offline

Activity: 22
Merit: 0


View Profile
December 05, 2025, 03:10:01 PM
 #12160

Yeah, man, you’re really being thick-headed.
You’re not even trying anymore - you just copy whatever you feed into ChatGPT without bothering to double-check it.
I sent you at least three scientific papers that claim the opposite.
Read the article again and stop copy-pasting whatever the AI generates for you.
https://faculty.uml.edu/rmontenegro/research/kangaroo-journal.pdf?utm_source

Pollard’s kangaroo method computes a discrete logarithm over a bounded interval by running two independent pseudorandom walks in a group. The solution arises when the walks first meet, yielding an expected running time of order √L, governed by the time to this collision.
This behavior is directly linked to the birthday paradox: as in the classical setting, the probability of a collision between two stochastic processes becomes significant after roughly the square root of the state-space size. Hence the kangaroo method is viewed as a specialized form of a birthday-type attack, adapted to group structure and the discrete logarithm problem.

Why don’t you want to admit that you were wrong? There’s nothing shameful about it.
Go take a shower, eat a sandwich, and think it over once again.
Pages: « 1 ... 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 [608] 609 610 611 612 613 614 615 616 617 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!