Questions tagged [math]
The math tag has no usage guidance.
38
questions
-3
votes
2
answers
53
views
Withdrawal profits
Ok so let’s say I buy a one bitcoin for 90k it peaks at 94k I withdraw the profit of 4K .if then it drops to 93k does that mean I now have a profit of 3k still or do I have to wait for it to drop back ...
2
votes
0
answers
80
views
What is the byte-wise xor operation mentioned in bip 340?
Let t be the byte-wise xor of bytes(d) and hash_BIP0340/aux(a)
Link: bip-0340
Actually, I think it means bitwise xor, not bytewise xor, but for the sake of clarity, I ask: What is the difference ...
1
vote
1
answer
293
views
What is the probability of randomly getting a 12 word seed phrase with the same word repeated 12 times?
It appears that the 12 word seed phrase CAN be the same word repeated 12 times.
Is it true that the probability of randomly generating that "stuttering seed phrase" would be:
= 2048 * (1/...
-2
votes
1
answer
55
views
Question on the integer size [closed]
Is there any kind of boolean division with bitcoin? There has to be something before the decimal number. Kind of say it seems like end to end and it always should be the number that is largest.
0
votes
1
answer
87
views
What am I doing wrong in calculating point addition? Is something redundant in the formula I am using?
First of all, just to note that I am having trouble with this MOD math, so for some this question might be basic, but in my case it caused a lot of confusion.
Just for the context. In my previous ...
1
vote
1
answer
300
views
Verifying a zkSNARK on Bitcoin/Hope for a future with OP_MUL
I am trying to write a script that can verify a SNARK, but from what I understand OP_MUL is still disabled in TapScript.
Is anyone working on a BIP to provide OP_MUL or OP_MUL64?
It seems ...
6
votes
1
answer
535
views
What is the relationship between the three possible X coordinates corresponding to a Y coordinate?
Every possible X coordinate on secp256k1 has two corresponding Y coordinates, one of which is the negation of the other. I've also been told that every possible Y coordinate has three corresponding X ...
2
votes
1
answer
128
views
What is the largest value that the x & y coordinates respectively can be/reach
We are all familiar with the x & y coordinates of the curve parameters used in bitcoin (or at least we should be).
In terms of being a collective point on graph, we know that the starting point G ...
-2
votes
1
answer
156
views
What happens to bitcoin if math is found that makes reversing PQ multiplication, modular math, etc, easy to reverse in a few steps?
What happens to bitcoin if math is found that makes reversing multiplication, modular math, etc, easy to reverse in a few steps? What if DH exhanges can be decoded almost as fast as they can happen? ...
2
votes
2
answers
343
views
Simple math in Script
I want to create a script that takes 3 numbers and verifies that:
Each of the numbers is less than 8.
The sum of the numbers is 15.
How can I do that?
0
votes
0
answers
146
views
secp256k1, reused nonce across two differents pubkeys
Edited: changing the notation according request by fgrieu.
I have prepared 4 transactions for 2 pubkeys with the same r1 and r2.
properties of secp256k1:
p = ...
12
votes
1
answer
422
views
How does this field multiplication in libsecp256k1 work?
I'm looking at libsecp256k1's codebase, for learning reasons (doubt I can contribute with anything useful there). While looking at the field implementation, the implementation of ...
2
votes
1
answer
208
views
weak transaction in secp256k1
My question is related to weak signature vulnerability testing where a hypothetical attacker does not know the values of the nonce or private key itself, but can determine that the nonce 'k1' is ...
1
vote
1
answer
94
views
Secp256k1: Does there exist an identity public key for combinations of public keys?
I am aware that the identity on elliptic curves is the infinity element.
Long shot (as it would be very useful to me): with that being said, does there exist a public key, pk, on secp256k1 such that, ...
1
vote
1
answer
48
views
Modelling random walks for double spending based on hashrate
I'm reading Analysis of hashrate-based double-spending where the following assumptions are made (on page 5):
The total hashrate of the honest network and the attacker is constant, say H. Let the ...