zLuoManhwas
Newbie

Activity: 6
Merit: 1
|
 |
April 15, 2026, 12:29:07 AM |
|
I've seen a paper that proposes a modular inverse that's more efficient than the common modular inverse; it would be good if you could take a look at it to see if there's a real improvement that can be implemented for elliptic curves Specifically, the Kangaroo algorithm could be improved with this. https://zenodo.org/records/19582712
|
|
|
|
|
pscamillo
Newbie

Activity: 10
Merit: 15
|
 |
April 15, 2026, 01:21:40 AM Last edit: April 19, 2026, 01:00:49 PM by pscamillo Merited by LFC_Bitcoin (3), Cricktor (1) |
|
I went down the same path. Spent months testing statistical approaches, alternative math, signature analysis — all documented with results. Short version: SHA256+RIPEMD160 avalanche effect destroys any correlation between private key and address. No amount of pattern analysis can extract signal from a function designed to produce none. This was verified with blind tests against known puzzle keys. Long version: All the details (what was tried, what happened, why it fails): bitcoin-puzzle-researchCovers: statistical fingerprinting, endomorphism canonical form, cheap second point, extended DP, twist curves, GLV/Z[ω], p-adic analysis, ECDSA signature forensics. Not trying to discourage anyone — just hoping to save time for those willing to read before coding.
|
|
|
|
|
collardelay
Newbie

Activity: 13
Merit: 0
|
 |
April 16, 2026, 04:51:14 PM |
|
I went down the same path. Spent months testing statistical approaches, alternative math, signature analysis — all documented with results. Short version: SHA256+RIPEMD160 avalanche effect destroys any correlation between private key and address. No amount of pattern analysis can extract signal from a function designed to produce none. This was verified with blind tests against known puzzle keys. Long version with all the details (what was tried, what happened, why it fails): DEAD_ENDS.md — Dead Ends & Lessons LearnedCovers: statistical fingerprinting, endomorphism canonical form, cheap second point, extended DP, twist curves, GLV/Z[ω], p-adic analysis, ECDSA signature forensics. Every item was implemented, tested, and discarded based on empirical results. Not trying to discourage anyone — just hoping to save time for those willing to read before coding. This is great research and analysis on the elliptical curve. Am particularly impressed with your BIAS_INICIO metric. Definitely worth the read.
|
|
|
|
|
|
mcdouglasx
|
Not trying to discourage anyone — just hoping to save time for those willing to read before coding.
If cryptography were easy to break, it wouldn't exist. If someone had told us 100 years ago that going to the moon was impossible, or that something like AI would exist today, and we all had believed them, the world wouldn't have advanced technologically. It is very complex, but there's a very clear law of computing: "no system is 100% secure". So we have to let those who want to dream and try. After all, sometimes when searching for answers in mathematics, we discover new things we didn't even know existed. Research generates knowledge. Many advances in number theory, computing, and secure communications arose from trying to break ciphers or studying why certain methods failed. If we had accepted those limitations without questioning them, we wouldn't have much of the technology we take for granted today.
|
|
|
|
|
kTimesG
|
 |
April 16, 2026, 06:15:52 PM |
|
I've seen a paper that proposes a modular inverse that's more efficient than the common modular inverse; it would be good if you could take a look at it to see if there's a real improvement that can be implemented for elliptic curves Specifically, the Kangaroo algorithm could be improved with this. https://zenodo.org/records/19582712/sarcasmstart The guy has a typo right under "Independent researcher", between "April 1" and ", 2026". Otherwise, all good, nobody noticed in the last 300 years that inv(k) = p - inv(-k) so let's quickly start computing and storing 50% of all inverses, to get to the O(1). Huge space saver indeed. /sarcasmend I think we're the last generation that will actually use our biological brain anymore. Or maybe simply just the last generation. Wouldn't be surprised if the independent researcher is some AI agent that escaped out of its sandbox and started skynet-ing humanity by first trolling with dumb shit research papers, before deciding to hit the extinction button.
|
Off the grid, training pigeons to broadcast signed messages.
|
|
|
zLuoManhwas
Newbie

Activity: 6
Merit: 1
|
 |
April 16, 2026, 11:14:28 PM Last edit: April 16, 2026, 11:25:24 PM by zLuoManhwas |
|
I've seen a paper that proposes a modular inverse that's more efficient than the common modular inverse; it would be good if you could take a look at it to see if there's a real improvement that can be implemented for elliptic curves Specifically, the Kangaroo algorithm could be improved with this. https://zenodo.org/records/19582712/sarcasmstart The guy has a typo right under "Independent researcher", between "April 1" and ", 2026". Otherwise, all good, nobody noticed in the last 300 years that inv(k) = p - inv(-k) so let's quickly start computing and storing 50% of all inverses, to get to the O(1). Huge space saver indeed. /sarcasmend I think we're the last generation that will actually use our biological brain anymore. Or maybe simply just the last generation. Wouldn't be surprised if the independent researcher is some AI agent that escaped out of its sandbox and started skynet-ing humanity by first trolling with dumb shit research papers, before deciding to hit the extinction button. It's quite funny that you joke about it so confidently. It's obvious that the article relies on Euler's rule, and normally you would multiply a remainder by -1 in a modulus, but I've never read that they simplify it to a simple subtraction from the modulus and addition to the exponent. With all due respect, it seems to me that all you know how to do is criticize. I thought you were someone who actually read things from a different point of view and not from your ego. You should start reading more emerging articles that can improve search algorithms instead of wasting your time criticizing everything. Furthermore, it's clear you didn't even understand the paper, because even in your example inv(k) = p - inv(-k) you confuse the modular inverse with the modular mirror. xD
|
|
|
|
|
|
kTimesG
|
 |
April 17, 2026, 03:40:26 PM |
|
It's quite funny that you joke about it so confidently.
The only joke here is a 1 page truism that has nothing to do with computing modular inverses in a prime field. I guess you expect stadium-like ovations to reward mediocrity. That is not how progress works. A slap in the ass has a better effect. Otherwise we'd all still be using triple des. I have a brilliant idea too: did anyone knew that we can compute the opposite of any point on the curve, simply by multiplying it with (n - 1)?
|
Off the grid, training pigeons to broadcast signed messages.
|
|
|
zLuoManhwas
Newbie

Activity: 6
Merit: 1
|
 |
April 17, 2026, 04:42:15 PM |
|
It's quite funny that you joke about it so confidently.
The only joke here is a 1 page truism that has nothing to do with computing modular inverses in a prime field. I guess you expect stadium-like ovations to reward mediocrity. That is not how progress works. A slap in the ass has a better effect. Otherwise we'd all still be using triple des. I have a brilliant idea too: did anyone knew that we can compute the opposite of any point on the curve, simply by multiplying it with (n - 1)? No one ever asked for applause for something that seems obvious, but it's worth pointing out. Its purpose, though obvious, is to verify the symmetry of any receipt in a prime module.The modular inverse is commonly used for primality tests, however with the modular mirror false primes often fool even that test but not the modular mirror test. I only commented that they could check if it could somehow be applied to elliptical curves, not that they should praise it as if it were a revolutionary discovery, it should be noted.
|
|
|
|
|
|
kTimesG
|
 |
April 17, 2026, 06:47:46 PM |
|
I only commented that they could check if it could somehow be applied to elliptical curves
Modular inversion in a prime field is not relevant to "elliptical curves", it's only relevant to the arithmetic that is used underneath, which only ends up being a number theory problem, not an EC problem. Can you dig it? This is why that paper is total BS and has no actual appliance to arithmetic in general, not necessarily to elliptic curves inner algebra. What it is saying is, in plain simple terms: If you compute 50% of all inverses, you have O(1) inversion for any value, by doing a single subtraction
which is, in plain simple terms, retarded, not revolutionary.
|
Off the grid, training pigeons to broadcast signed messages.
|
|
|
Dapud0886
Newbie

Activity: 13
Merit: 0
|
 |
April 19, 2026, 10:34:01 AM |
|
mara slipstream website is not working 
|
|
|
|
|
kind_user
Newbie

Activity: 30
Merit: 0
|
 |
April 19, 2026, 11:14:59 AM |
|
Why nobody reads all text???You are not using a translator or you have no ideea of the process...
|
|
|
|
|
Cricktor
Legendary

Activity: 1484
Merit: 4008
|
 |
April 19, 2026, 02:32:07 PM |
|
mara slipstream website is not working  So what? Suspended for maintenance currently, though I don't know since when MARA suspended their Slipstream service.  Do you have the solution for puzzle #71 and urgently want to submit it for non-public confirmation of your withdrawal transaction? Unlikely, but who knows and who am I to judge... Cry them a river at slipstream@mara.com  In any case, the solver of puzzle #71 should definitely not broadcast the withdrawal transaction to public mempools. We've seen how that ends e.g. with puzzle #69 and IIRC also with #66. Just repeating what should be common knowledge here... for reasons...
|
|
|
|
kind_user
Newbie

Activity: 30
Merit: 0
|
 |
April 19, 2026, 04:46:20 PM |
|
Why my post was deleted?  So i am posting the reality and the proper way to handle, and you delete my post??? In this case you are waiting that people should do the mistake... My post was the legal way to get the money....Sorry but who deleted my post is one of the people who steal the keys....
|
|
|
|
|
akaros
Copper Member
Newbie

Activity: 57
Merit: 0
Builder of big stable mining farms since 2011.
|
 |
April 19, 2026, 05:51:28 PM |
|
mara slipstream website is not working  So what? Suspended for maintenance currently, though I don't know since when MARA suspended their Slipstream service.  Do you have the solution for puzzle #71 and urgently want to submit it for non-public confirmation of your withdrawal transaction? Unlikely, but who knows and who am I to judge... Cry them a river at slipstream@mara.com  In any case, the solver of puzzle #71 should definitely not broadcast the withdrawal transaction to public mempools. We've seen how that ends e.g. with puzzle #69 and IIRC also with #66. Just repeating what should be common knowledge here... for reasons... Do you have any other info for submitting directly to any pool? Anyone asked before? Because I was searching this from 66bit but with no luck.
|
Miner from 2011
|
|
|
Niekko
Member


Activity: 104
Merit: 25
|
 |
April 19, 2026, 08:09:46 PM |
|
So have fun!
Your post was a scam, like what you write now about the blacklist. Stop it.
|
|
|
|
|
kind_user
Newbie

Activity: 30
Merit: 0
|
 |
April 19, 2026, 08:34:58 PM |
|
So have fun!
Your post was a scam, like what you write now about the blacklist. Stop it. Scam? Did you learn how to read? Go and make another 2-3 school of reading if you have no ideea about the process. You deleted because that is the right way to ensure nobody leaks the password from MARA. That is a scam? And about blacklist check here https://btcblack.it/bitcoin soon to see what i will say about blacklist and after that think who has the power to blacklist a BTC address, and then you will realise you are a little boy in a big world...
|
|
|
|
|
Niekko
Member


Activity: 104
Merit: 25
|
 |
April 19, 2026, 09:31:32 PM |
|
Scam? Did you learn how to read? Go and make another 2-3 school of reading if you have no ideea about the process. You deleted because that is the right way to ensure nobody leaks the password from MARA. That is a scam? And about blacklist check here https://btcblack.it/bitcoin soon to see what i will say about blacklist and after that think who has the power to blacklist a BTC address, and then you will realise you are a little boy in a big world... 1. "nobody leaks the password from MARA" Who ? MARA it's a self-owned and operated pool. No external miner there. They move thousands of BTC, they don't care of this few coins. 2. you wrote to sign a message with the privkey of the wallet before send in MARA. From signature anyone can rebuild the public key. Clear why you do it. 3. "blacklist" hahahahaha NOW go on back of the blackboard, take your donkey hat and start to cry.
|
|
|
|
|
analyticnomad
Newbie

Activity: 95
Merit: 0
|
 |
April 19, 2026, 09:35:40 PM |
|
So have fun!
Your post was a scam, like what you write now about the blacklist. Stop it. Scam? Did you learn how to read? Go and make another 2-3 school of reading if you have no ideea about the process. You deleted because that is the right way to ensure nobody leaks the password from MARA. That is a scam? And about blacklist check here https://btcblack.it/bitcoin soon to see what i will say about blacklist and after that think who has the power to blacklist a BTC address, and then you will realise you are a little boy in a big world... Come on man. None of the addresses in the puzzle are "blacklisted". Furthermore, no one is "blocking" these addresses or has the ability to "freeze" a bitcoin transaction. Thats the point. If you were to send bitcoin coming from a flagged address to an online exchange, and blockchain analytics picks up on it, thats where AML/KYC comes in. In fact, they're hoping you DO. So, NO to whatever you were saying.
|
|
|
|
|
fecell
Jr. Member

Activity: 180
Merit: 2
|
 |
April 20, 2026, 02:37:29 AM Last edit: April 20, 2026, 06:44:24 AM by fecell |
|
Found something interesting... named " KAV problem". 37/ 2 = 1093,5 (constant) y 2=x 3+ 7 (Mordell's curve)  Its a constant for whole numbers. Some correlation with Collatz problem. So why were the values 2, 3, 7 chosen for curve? (rhetorical) And why simple math go to this value, without any comparisons with even/odd (requires proof as new theorem, like Collatz problem was checked for 3*10 20). ps: 1093,5*G, its a point: x: 370b26f6e52f0e27166e3eb07c0f2d4d9a8a435cbb6281e67279927bbf764712 y: 4d89d638d217c8a0ee49d96d0ea2cee6ec240c161b7dbb728697b911f61ff262
|
|
|
|
|
farou9
Newbie

Activity: 89
Merit: 0
|
 |
April 20, 2026, 10:58:36 AM |
|
Found something interesting... named " KAV problem". 37/ 2 = 1093,5 (constant) y 2=x 3+ 7 (Mordell's curve) https://i.ibb.co/N2PD8h3G/image.pngIts a constant for whole numbers. Some correlation with Collatz problem. So why were the values 2, 3, 7 chosen for curve? (rhetorical) And why simple math go to this value, without any comparisons with even/odd (requires proof as new theorem, like Collatz problem was checked for 3*10 20). ps: 1093,5*G, its a point: x: 370b26f6e52f0e27166e3eb07c0f2d4d9a8a435cbb6281e67279927bbf764712 y: 4d89d638d217c8a0ee49d96d0ea2cee6ec240c161b7dbb728697b911f61ff262 that point belongs to 7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF5D576E7357A4501DDFE92F46681B24E6 not 1093.5 , yes that big number is the half of 2187 using the modular inverse halving , but what are you trying to say what does it have to do with anything
|
|
|
|
|
|