Bitcoin Forum
April 01, 2026, 11:12:29 PM *
News: Latest Bitcoin Core release: 30.2 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Lattice attack  (Read 254 times)
Bglhn (OP)
Newbie
*
Offline Offline

Activity: 30
Merit: 0


View Profile
March 28, 2024, 06:32:01 PM
 #1

How do you find the nonce bit in lattice operations?
I want to use https://github.com/bitlogik/lattice-attack, but I don't know how to fill the data.json file with my original data. Can anyone detail the process?
Hameed93
Newbie
*
Offline Offline

Activity: 13
Merit: 0


View Profile
March 28, 2024, 06:51:05 PM
 #2

I was reading about the lattice attack few weeks back and I laid my eyes on some file that helped.. this will help understand it better:- https://eu.docworkspace.com/d/sIBTYnLiZAc72lrAG
MikeJ_NpC
Member
**
Offline Offline

Activity: 131
Merit: 10

if you want to lie *cough*use your data; not mine.


View Profile
January 18, 2025, 02:39:18 PM
 #3

So...  IF i have a matching R on "the lattice" (not any formula in here) against the signature is that enough to say its valid?   It does display a key but im trying to confirm the results before i bother converting it.
It seems the lattice doesnt like adding in the publickey into the formula and fails on add and inverse functions..    was attempting cross validation but after tending to a dozen flags i dont think that option will work lol

That all being said, i did it to 2 sigs and they both came back with a matching R ... then went to test on something else which failed... so that proofs it half way i guess..
Just want to know if the R matching is enough or if there is another method to confirm the result... ??


If Karma is a bitch, then god is a woman. I ask to know, not to be screwed or hear trite excuses (after the fact) which a 3rd grader could do better on. If you give your word, keep it atleast..
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!